Wed. Oct 4th, 2023

Take our quiz!

Great job! You got 5 out of 5 questions correct.

Look below to see what you got right, what you got wrong, and why!

Question 1 of 5

Why is separation of duties important for security purposes?

  • a. It ensures that multiple people can do the same job.
  • b. It prevents an organization from losing important information when they lose ­important people.
  • c. It prevents any single security person from being able to make major security changes without involving other individuals.
  • d. It helps employees concentrate their talents where they will be most useful.

Question 2 of 5

What is the final step of a quantitative risk analysis?

  • a. Determine asset value.
  • b. Assess the annualized rate of occurrence.
  • c. Derive the annualized loss expectancy.
  • d. Conduct a cost/benefit analysis.

Question 3 of 5

An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat?

  • a. Spoofing
  • b. Information disclosure
  • c. Repudiation
  • d. Tampering

Question 4 of 5

How can a data retention policy help to reduce liabilities?

  • a. By ensuring that unneeded data isn’t retained
  • b. By ensuring that incriminating data is destroyed
  • c. By ensuring that data is securely wiped so it cannot be restored for legal discovery
  • d. By reducing the cost of data storage required by law

Question 5 of 5

Which of the following is not a weakness in Kerberos?

  • a. The KDC is a single point of failure.
  • b. Compromise of the KDC would allow attackers to impersonate any user.
  • c. Authentication information is not encrypted.
  • d. It is susceptible to password guessing.




This question may be especially challenging since it asks the question in roundabout way. These questions are presented with statements like “which of the following is NOT”, which is misleading for those of us who are quick readers. The best approach with questions like this is to rephrase the question in your mind, and turn it into something like “all of these are good options EXCEPT” and then find the choice that doesn’t fit.

Knowledge needed:

Negative tests demonstrate application behavior when there is unexpected or invalid data. Information on this can be found in Domain 6.

Excerpted from CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition, ©2015 John Wiley & Sons, All Rights Reserved.

By admin

Hello, from Your Web Company .We have  PROFITABLE domains that are currently on sale that you might be interested in !


Whatsapp 2348064950565



Average Google Search Results for these domains is: 846,000
You can easily redirect all the traffic this domain gets to your current site!


SWORDPRESS ! 5,000 Daily page views Advertise from 10,000 naira daily on africa's leading trending news search engine and investigative blog

Buy Now Start Profit


Anytime someone types these premium domains like  Online, or any other phrase with this keyword into their browser, your site could be the first they see!

The Internet is the most efficient way to acquire new customers

Avg Google Search Results for these domains is: 846,000
You can easily redirect all the traffic this domain gets to your current site! appraises these  domains at a range of 500 to  $1,969.

Priced at only $200 for a limited time! If interested please go to and select Buy Now, or purchase directly at
Act Fast! First person to select Buy Now gets it!

Thank you very much for your time.
Best Regards,

Abi John Balogun



Buy Now Start Profit

This will close in 20 seconds