CISSP Communication and Network Security Practice Exam Set 3

Every layer of the DoD TCP / IP model to control the communication flow between the hosts?


Options are :

  • Internet layer
  • Access to the network layer
  • application layer
  • Host-to-Host Transport Layer (Correct)
  • None

Answer : Host-to-Host Transport Layer

Which of the following methods to provide continuity of data communication involves the use of alternative media?


Options are :

  • alternative routing (Correct)
  • diverse routing
  • None
  • Last mile short-circuit protection
  • Long haul network diversity

Answer : alternative routing

CISSP - Security Engineering Mock Questions

Any of the following statements is NOT a characteristic of Internet Protocol Security (IPSec)


Options are :

  • The identity of the IPSec endpoints strengthen other responses
  • the number of exchanged packets can be calculated.
  • Data can not be read into the wrong hands
  • None
  • Data will be exactly the same order in which it is transmitted (Correct)

Answer : Data will be exactly the same order in which it is transmitted

Each layer defines how packets are routed to computers?


Options are :

  • transport layer
  • DataLink Layer
  • Session layer
  • the network layer (Correct)
  • None

Answer : the network layer

International Organization for Standardization / Open Systems Interconnection (ISO / OSI) layer is not which of the following?


Options are :

  • The standard model network communication
  • Used to gain information about the network devices such as the number of packets received and the routing tables (Correct)
  • Allows different message than
  • 7 defines the protocol layers (also known as a protocol stack)
  • None

Answer : Used to gain information about the network devices such as the number of packets received and the routing tables

CISSP Security Engineering Certification Practical Exam Set 2

Similar to the Secure Shell (SSH-2), Secure Sockets Layer (SSL) is used to encrypt the symmetric encryption most of the data transmitted during the session and to use it for an asymmetric or public key cryptography:


Options are :

  • None
  • peer Authentication (Correct)
  • name Resolution
  • peer Identification
  • server authentication

Answer : peer Authentication

What service usually runs on port 25?


Options are :

  • Simple Mail Transfer Protocol (SMTP) (Correct)
  • File Transfer Protocol (FTP)
  • Telnet
  • Domain Name Service (DNS)
  • None

Answer : Simple Mail Transfer Protocol (SMTP)

Which of the following is NOT a VPN communications protocol standard?


Options are :

  • Challenge Handshake Authentication Protocol (CHAP) (Correct)
  • IP Security
  • L2TP (L2TP)
  • None
  • PPTP (PPTP)

Answer : Challenge Handshake Authentication Protocol (CHAP)

CISSP - Security Operations Mock Questions

Packet filtering firewalls also allow access to:


Options are :

  • only authorized application gateway or ex-service numbers.
  • only unauthorized application port or service numbers
  • Only authorized application service numbers or port (Correct)
  • None
  • only authorized application gateway or service integers.

Answer : Only authorized application service numbers or port

Which of the following focused on data security encryption protocols is operating in a layer different from the others?


Options are :

  • None
  • Sequenced Packet Exchange (SPX)
  • Secure HTTP (S-HTTP) (Correct)
  • Secure Socket Layer (SSL)
  • Secure FTP (FTP)

Answer : Secure HTTP (S-HTTP)

Each layer of the TCP / IP protocol model defines the IP datagram and handles the routing of data between the networks?


Options are :

  • Access to the network layer
  • Host-to-Host Transport Layer
  • Internet layer (Correct)
  • application layer
  • None

Answer : Internet layer

CISSP Security and Risk Management Certified Practice Exam Set 4

Every layer of the TCP / IP protocol model which best corresponds to the OSI / ISO model of network layer?


Options are :

  • application layer
  • Access to the network layer
  • Internet layer (Correct)
  • None
  • Host-to-Host Transport Layer

Answer : Internet layer

Each of the OSI / ISO layer to determine how to handle the physical devices online?


Options are :

  • The Data Link Layer (Correct)
  • None
  • application layer
  • Session layer
  • transport layer

Answer : The Data Link Layer

IANA Which of the following are given by the well-known ports?


Options are :

  • None
  • gates 0-1024
  • gates 0-255
  • gates 0-127
  • gates 0-1023 (Correct)

Answer : gates 0-1023

CISSP - Software Development Security Mock Questions

How many bits make up an IPv6 address?


Options are :

  • 128 bits (Correct)
  • 32 bits
  • 96 bits
  • None
  • 32 bits

Answer : 128 bits

Which of the following is immune to electromagnetic interference (EMI), and therefore has a much longer effective useful length?


Options are :

  • coaxial cable
  • coaxial cable
  • Fiber optic cable (Correct)
  • wisted-pair cable
  • None

Answer : Fiber optic cable

Communications and network security associated with the transmission, which of the following?


Options are :

  • voice, data and multimedia (Correct)
  • multimedia data, and
  • voice and multimedia
  • sound
  • None

Answer : voice, data and multimedia

CISSP - Mock Questions with all domains

Tim is a network administrator Acme Inc. He is responsible for the configuration of network devices. John new security management program examines configured firewall detects and Tim issue.This special firewall is configured in failover mode of the second firewall. A sniffer is a PC connected to the same switch as firewalls can interpret the credentials of Tim Tim configuring firewalls.Which the following should be used to ensure that no one can eavesdrop on communications?


Options are :

  • None
  • SCP
  • SFTP
  • SSH (Correct)
  • RSH

Answer : SSH

One of the following statements differences between PPTP and L2TP is not true


Options are :

  • None
  • L2TP supports AAA servers
  • PPTP can run only on IP networks.
  • .PPTP is an encryption protocol and L2TP is not
  • L2TP works well with any firewall and devices that perform NAT. (Correct)

Answer : L2TP works well with any firewall and devices that perform NAT.

The OSI layer is a service that is negotiating the transfer syntax and translates information and transfer syntax to users, which represent data from different syntaxes. In which the following layers could you find such a service?


Options are :

  • None
  • session
  • Transport
  • demonstration (Correct)
  • application

Answer : demonstration

CISSP Security and Risk Management Certified Practice Exam Set 2

Which of the following types of cable length is limited to 185 meters?


Options are :

  • 10BaseT
  • 10Base5
  • RG58 (Correct)
  • 10BaseT
  • None

Answer : RG58

CISSP Security Engineering Certification Practice Exam Set 8

Which of the following protocols do not operate the data link layer (layer 2)?


Options are :

  • L2F
  • CMP (Correct)
  • None
  • RARP
  • PPP

Answer : CMP

What attack associated factor plays a forged packet (s) containing the same destination and source IP address, such as a remote host, the same gate-source and destination, with the SYN flag, and subject to open ports that are open to the remote host?


Options are :

  • ground attack (Correct)
  • Boink attack
  • teardrop attack
  • Smurf attack
  • None

Answer : ground attack

Every Network Address Translation (NAT) is the most convenient and secure solution?


Options are :

  • None
  • Dedicated Address Translation
  • Port Address Translation (Correct)
  • Concealed Network Address Translation
  • Static Address Translation

Answer : Port Address Translation

CISSP Security Engineering Certification Practical Exam Set 4

Each of the following is a method of data multiplexing in which the communication channel is divided into an arbitrary number of variable bit rate digital channels or data streams. This process allocates bandwidth dynamically physical channel, which is transmitted?


Options are :

  • Frequency division multiplexing
  • Time-Division Multiplexing
  • Asynchronous time division multiplexing
  • statistical multiplexing (Correct)
  • None

Answer : statistical multiplexing

Each layer of the OSI / ISO model handles physical addressing, network topology, line discipline, error notification, the controlled delivery of frames, and optional flow control?


Options are :

  • data Connection (Correct)
  • network
  • None
  • session
  • physical

Answer : data Connection

Which of the following services based on UDP?


Options are :

  • None
  • Telnet
  • SMTP
  • DNS (Correct)
  • FTP

Answer : DNS

CISSP Security Engineering Certification Practice Exam Set 7

Address Resolution Protocol (ARP) queries the network by sending out?


Options are :

  • send. (Correct)
  • semicast.
  • multicast.
  • unicast.
  • None

Answer : send.

Which of the following statements packet filtering is not true?


Options are :

  • It is based on ACLs
  • None
  • It monitors the status of the connection. (Correct)
  • It is not dependent on the application.
  • It operates at the network layer.

Answer : It monitors the status of the connection.

Which of the following best describes the Secure Electronic Transaction (SET) protocol?


Options are :

  • None
  • Proprietary Medicinal Visa and MasterCard as digital signatures for Internet credit card protocol. (Correct)
  • Proprietary Medicinal Visa and MasterCard credit card as the Internet protocol using the Transport Layer.
  • Proprietary Medicinal VISA and American Express credit card for Internet Protocol SSL.
  • Proprietary Medicinal Visa and MasterCard credit card as the Internet Protocol Message Authentication Code.

Answer : Proprietary Medicinal Visa and MasterCard as digital signatures for Internet credit card protocol.

CISSP - Software Development Security Mock Questions

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

Subscribe to See Videos

Subscribe to my Youtube channel for new videos : Subscribe Now