CISSP Question of the Day – 8-31-2016

Getting You Prepped for the CISSP Exam ...One Question at a Time!

Today’s CISSP question topic: Access Control

You have some data that you want to share with other users. Confidentiality is not a requirement but data integrity and origin authentication are necessary. Which of the following is the best approach to achieving these two goals??

  1. Use TCP Wrappers
  2. Transmit the data using ESP (IPSec)
  3. Use HMAC (Hashed Message Authentication Code)
  4. Save your data on an NTFS volume and enbale EFS
  5. Assign your account to be the only one with WRITE permission; give all other users READ permission. User can verify that all writes were done by you by examining the permissions on the file.
  6. Generate a self-signed cerfificate. Sign the data.



Check Your Answer


  1. Use HMAC (Hashed Message Authentication Code)

Supporting Links:
  1. https://en.wikipedia.org/wiki/Hash-based_message_authentication_code


Co-workers, friends or colleagues studying for the CISSP exam, too? Share this question with them! Click an icon below to share to your preferred social media platform!
Posted in:
About the Author

Colin Weaver

Colin Weaver is co-owner and lead instructor at ITdojo, Inc., a network security and information assurance training center and consulting firm located in Virginia Beach, VA. His passion for technology, networks, and security has led him to become enthralled with the idea of IPv6 and its implementation. In this blog he will share with you glimpses of what he has learned and a hint at what you’ll learn in his classes.