CISSP Communication and Network Security Practice Exam Set 2

Which of the following LAN devices is the physical layer of the OSI / ISO model?


Options are :

  • Bridge
  • Change
  • None
  • router
  • pole

Answer : pole

CISSP - Security Operations Mock Questions

In UTP category rating, the tighter the wind:


Options are :

  • None
  • a longer rating and its resistance to interference and attenuation.
  • slower classification and its resistance to interference and attenuation.
  • shorter classification and its resistance to interference and attenuation
  • the higher the rating, and its resistance to interference and crosstalk.

Answer : the higher the rating, and its resistance to interference and crosstalk.

Which of the following provides the security for wireless communications?


Options are :

  • None
  • WDP
  • WTLS
  • WTLS
  • CHANGE

Answer : WTLS

Communications equipment must operate:


Options are :

  • a high speed interfacing.
  • None
  • communicate at the same speed.
  • at different speeds to communicate.
  • at varying speeds to interact.

Answer : communicate at the same speed.

CISSP - Security and Risk Management Pratice Questions

Layer 2 of the OSI model is a two sublayers. What are the sublayers, and what are the two IEEE standards, which describe techniques at that floor?


Options are :

  • Network and MAC; IEEE 802.1 and 802.3
  • LLC and MAC; IEEE 802.1 and 802.3
  • LLC and MAC; IEEE 802.2 and 802.3
  • None
  • LLC and MAC; IEEE 802.2 and 802.3

Answer : Network and MAC; IEEE 802.1 and 802.3

Which of the following techniques have been developed to support over TCP / IP networks, low-speed serial interfaces?


Options are :

  • xDSL
  • None
  • SLIP
  • ISDN
  • T1

Answer : SLIP

Which of the following IEEE standards defining the Token Ring media use?


Options are :

  • None
  • 802.3
  • 802.2
  • 802.5
  • 802.11

Answer : 802.5

CISSP - Security Operations Mock Questions

Which of the following Common Data Network can send and receive e-mail internally or externally email gateway device?


Options are :

  • File Services.
  • Print services.
  • Postal services.
  • None
  • Client / Server services.

Answer : Postal services.

Which of the following Common Data Network to share computing power to a lack of resources, some workstations shared resources be centralized on a server?


Options are :

  • Client / Server Services
  • Domain Name Service
  • None
  • file services
  • printing services

Answer : Client / Server Services

Domain Name Service is a distributed database system used to map:


Options are :

  • MAC address of the IP addresses.
  • IP addresses into MAC addresses.
  • Domain Name IP addresses.
  • None
  • The MAC addresses of the domains.

Answer : Domain Name IP addresses.

CISSP-ISSAP Information Systems Security Architecture Exam Set 7

Which of the following media most resistant to EMI interference?


Options are :

  • microwave
  • optical fiber
  • coaxial cable
  • None
  • Twisted pair

Answer : optical fiber

CISSP - Security and Risk Management Pratice Questions

Transport Layer Security (TLS) is a two-story socket layer security protocol that contains the TLS Record Protocol and:


Options are :

  • None
  • Transport Layer Security (TLS) Handshake Protocol.
  • Transport Layer Security (TLS) Link Protocol.
  • Transport Layer Security (TLS) Data Protocol.
  • Transport Layer Security (TLS) Internet Protocol.

Answer : Transport Layer Security (TLS) Handshake Protocol.

Every OSI / OSI layer defines the X.24, V.35, X.21 and HSSI standard interfaces?


Options are :

  • DataLink Layer
  • the network layer
  • None
  • transport layer
  • physical layer

Answer : physical layer

Secure Sockets Layer (SSL) is very heavily used to protect which of the following?


Options are :

  • Web transactions.
  • Telnet transactions.
  • Electronic payment transactions.
  • EDI transactions
  • None

Answer : Web transactions.

CISSP Security and Risk Management Certified Practice Exam Set 3

What is the maximum length of cable that can be used twisted pair, Category 5 10Base-T cable?


Options are :

  • 100 meters
  • 80 meters
  • 500 meters
  • 185 meters
  • None

Answer : 100 meters

What protocol is used for the Local Area Network (LAN) to obtain the IP address of a known MAC address?


Options are :

  • Network Address Translation (NAT)
  • DataLink Layer
  • None
  • Reverse Address Resolution Protocol (RARP)
  • Address Resolution Protocol (ARP)

Answer : Reverse Address Resolution Protocol (RARP)

systems based on behavior also known as?


Options are :

  • Profile-based systems
  • None
  • Abuse detective systems
  • formulas systems
  • rule-based IDS

Answer : Profile-based systems

CISSP - Security Operations Mock Questions

Each of the OSI / ISO layer is the Media Access Control (MAC) sub-layer part?


Options are :

  • the network layer
  • DataLink Layer
  • transport layer
  • None
  • physical layer

Answer : DataLink Layer

How many layers are defined within the US Department of Defense (DoD) TCP / IP model?


Options are :

  • 4
  • None
  • 5
  • 3
  • 7

Answer : 4

Secure Sockets Layer (SSL) is very heavily used to protect which of the following?


Options are :

  • Telnet transactions.
  • EDI transactions.
  • Web transactions.
  • None
  • Electronic payment transactions.

Answer : Web transactions.

CISSP-ISSEP Information Systems Security Engineering Exam Set 3

Every port is Post Office Protocol version 3 (POP3) to use?


Options are :

  • None
  • 110
  • 109
  • 119
  • 139

Answer : 110

Which of the following is true of computer networks to smell?


Options are :

  • Sniffers are gaining network access.
  • Sniffers send IP fragments system, which overlap with each other
  • Sniffers change the source address of the computer cover and take advantage of weak authentication methods.
  • None
  • Unauthorized sniffers to monitor data passing through the network.

Answer : Unauthorized sniffers to monitor data passing through the network.

The International Organization for Standardization / Open Systems Interconnection (ISO / OSI) layer 7 does not include which of the following?


Options are :

  • TCP (Transmission Control Protocol)
  • None
  • SNMP (Simple Network Management Protocol
  • HTTP (Hypertext Transfer Protocol)
  • The International Organization for Standardization / Open Systems Interconnection (ISO / OSI) layer 7 does not include which of the following?

Answer : TCP (Transmission Control Protocol)

CISSP - Security Assessment and Testing Mock

With the OSI / ISO layer model of IP is implemented?


Options are :

  • transport layer
  • the network layer
  • Session layer
  • None
  • DataLink Layer

Answer : the network layer

International Organization for Standardization / Open Systems Interconnection (ISO / OSI) layers 6 is which of the following?


Options are :

  • the network layer
  • presentation layer
  • None
  • application layer
  • The Data Link Layer

Answer : presentation layer

Transport Layer Security (TLS) is a two-story socket layer security protocol that contains the TLS Record Protocol and:


Options are :

  • None
  • Transport Layer Security (TLS) Link Protocol.
  • Transport Layer Security (TLS) Handshake Protocol.
  • Transport Layer Security (TLS) Internet Protocol.
  • Transport Layer Security (TLS) Data Protocol

Answer : Transport Layer Security (TLS) Handshake Protocol.

CISSP - Security Operations Mock Questions

Every type of attack associated with the host and the target session between capture by predicting the target is chosen first TCP sequence number?


Options are :

  • None
  • Smurf attack
  • SYN flood attack
  • The TCP sequence number attack
  • IP spoofing attack

Answer : The TCP sequence number attack

Phones different types of connections are used. Contact your phone company


Options are :

  • loopback
  • a new loop
  • indigenous loop
  • None
  • local loop

Answer : local loop

The area of ??telecommunications and Network Security domain it directly affects the Information Systems Security tenet Availability can be defined as:


Options are :

  • AC accountability
  • Netware availability
  • network acceptability
  • None
  • network availability

Answer : network availability

CISSP Security Engineering Certification Practice Exam Set 5

Every ISO / OSI layer formed over individual devices to connect to the physical communication link or channel?


Options are :

  • DataLink Layer
  • None
  • physical layer
  • transport layer
  • the network layer

Answer : DataLink Layer

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

Subscribe to See Videos

Subscribe to my Youtube channel for new videos : Subscribe Now