Home > Blogs > CISSP Questions of the Week

CISSP Questions of the Week

These CISSP Questions of the Week questions and answers were developed by Shon Harris and the Logical Security development team. We hope you find this to be a helpful resource. Simply select the "Click Here" under each question to find the answer.

1.  Which of the following is a method for determining functions, identifying functional failures, and assessing the causes of failure and their failure effects through a structured process?

       A. Operationally Critical Threat, Asset, and Vulnerability Evaluation
       B. ANZ 4360
       C. Failure Modes and Effect Analysis
       D. NIST SP 800-66

       Click Here for the Answer

******************************************************************************

2. Which of the following best describes a SYN flood?
 
      A. Many new TCP connections in a short period of time
      B. Exceeding the limit of TCP connections on a system
      C. Denial of service attack that sends a stream of ACK packets
      D. Denial of service attack that sends a stream of SYN/ACK packets

       Click Here for the Answer

******************************************************************************

3. You are trying to provide a secure method of terminal access to a remote computer.  Which protocol should you use?

       A. Telnet
       B. rlogin
       C. SSH
       D. rsh

       Click Here for the Answer

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.