CISSP Communication and Network Security Practice Exam Set 4

What protocol is used for e-mail?


Options are :

  • Post Office Protocol (POP).
  • Network File System (NFS).
  • File Transfer Protocol (FTP).
  • None
  • Simple Mail Transfer Protocol (SMTP).

Answer : Simple Mail Transfer Protocol (SMTP).

IPSec, if the communication is to be the gateway-to-gateway or host-to-gateway:


Options are :

  • Both the tunnel and transport mode can be used
  • Encapsulating Security Payload (ESP) is used for authentication
  • None
  • Only mode of transport may be used for
  • Tunnel mode of operation requires

Answer : Tunnel mode of operation requires

Which of the following protocols work session (layer 5)?


Options are :

  • None
  • RPC
  • IGMP
  • SPX
  • LPD

Answer : RPC

CISSP - Security Assessment and Testing Mock

Which of the following is not true about IPsec tunnel mode?


Options are :

  • Essentially, an IP tunnel, encryption and authentication
  • Established gateway service
  • Essentially, an IP tunnel, encryption and authentication
  • None
  • .Have two IP headers

Answer : Essentially, an IP tunnel, encryption and authentication

In the client and server SSL session, which is responsible for producing a secret, which is used as a seed to generate symmetric keys that are used during the session?


Options are :

  • The web server
  • the client browser
  • Dealer Certificate Server
  • Both the client and server
  • None

Answer : the client browser

Ethernet Address consists of how many bits?


Options are :

  • None
  • 48-bit address
  • 32-bit address
  • 128-bit address
  • 64-bit address

Answer : 48-bit address

CISSP Security Assessment Testing Security Operations Exam Set 6

Which of the following is not a common weakness of packet filtering firewalls?


Options are :

  • Vulnerability to IP spoofing.
  • None
  • No support for advanced user authentication systems.
  • Limited Sign On
  • Vulnerability to denial-of-service attacks and related

Answer : Vulnerability to IP spoofing.

What protocol's primary function is to facilitate the transfer of files and directories between two computers?


Options are :

  • Simple Mail Transfer Protocol (SMTP)
  • Telnet.
  • File Transfer Protocol (FTP).
  • TFTP (TFTP)
  • None

Answer : File Transfer Protocol (FTP).

What is the main reason why some sites do not want to take the TFTP (TFTP)?


Options are :

  • Activities due to safety risks
  • It does not offer a high level of encryption, such as FTP
  • It is too difficult to manage permissions restrictions TFTP
  • None
  • It can support the Lightweight Directory Access Protocol (LDAP)

Answer : Activities due to safety risks

CISSP Security Assessment Testing Security Operations Exam Set 1

All the hosts in an IP network is a logical identifier, called a (n):


Options are :

  • datagram address
  • Mac address.
  • TCP address
  • IP address
  • None

Answer : IP address

Which of the following statements is not true IPSec Transport mode?


Options are :

  • The set-up the end-point is the end of the communication host or end points
  • If the gateway-host communication is used, the gateway is to act as host to
  • When the ESP security protocol is used, only the hash applied to the upper layer protocols contained in the packet
  • None
  • It is required for gateway provides access to internal systems

Answer : It is required for gateway provides access to internal systems

Which of the following statements is not true IPSec?


Options are :

  • IPSec protects the man-in-the-middle attacks
  • IPSec can help protect networks, some of the IP-network attacks.
  • IPSec provides confidentiality and integrity of information transferred to the traffic encryption and authentication via IP networks
  • IPSec protects spoofing
  • None

Answer : IPSec provides confidentiality and integrity of information transferred to the traffic encryption and authentication via IP networks

CISSP - Security and Risk Management Pratice Questions

At the initial stage the configuration of the firewall, which is found in the following Internet firewall policy rules is inappropriate?


Options are :

  • The firewall is configured to deny all services of express permission.
  • The appropriate firewall documentation and a copy of the rules database stored offline storage always
  • None
  • The firewall should be tested online first to confirm the correct settings.
  • The firewall will start on a dedicated computer

Answer : The firewall should be tested online first to confirm the correct settings.

Which of the following statements PPTP (PPTP) is not true?


Options are :

  • PPTP allows any tunneling protocols, which can be carried out within the PPP.
  • PPTP does not support any token-based authentication method for users.
  • None
  • PPTP does not provide strong encryption.
  • PPTP is derived from an L2TP.

Answer : PPTP is derived from an L2TP.

When a station communicates on the network for the first time, which of the following protocol would have to search and find the Internet Protocol (IP) address matches that are known to be an Ethernet address?


Options are :

  • Reverse Address Resolution Protocol (RARP).
  • Internet Control Message Protocol (ICMP)
  • None
  • Address Resolution Protocol (ARP)
  • User Datagram Protocol (UDP).

Answer : Reverse Address Resolution Protocol (RARP).

CISSP Security and Risk Management Certified Practice Exam Set 1

Secure Electronic Transaction (SET) and Secure HTTP (S-HTTP) to operate every layer of the OSI model?


Options are :

  • Application Layer.
  • Transport Layer.
  • None
  • the network layer
  • Session Layer.

Answer : Application Layer.

Which of the following is NOT a feature or a lack of packet filtering gateways?


Options are :

  • They do not support strong user authentication.
  • They do not protect the IP or DNS address-spoofing.
  • None
  • The source and destination addresses, protocols and ports contained in the IP packet header are the only information that is available to the router making or not internal traffic is allowed to access the network.
  • They are suitable for the average risk for the environment.

Answer : They are suitable for the average risk for the environment.

f the organization was to introduce only one Intrusion Detection System (IDS) to protect the sensor information from the Internet:


Options are :

  • It should be host-based, and to install an external router and the Internet.
  • It should be a host-based system and installed in the most critical DMZ, the external router and the firewall.
  • None
  • It should be web-based and installed between the firewall and the DMZ intranets
  • It should be on a network and installed in the DMZ, the external router and the firewall.

Answer : It should be on a network and installed in the DMZ, the external router and the firewall.

CISSP - Mock Questions with all domains

Which of the following protocol is used primarily to provide confidentiality of the web-based application in such a way to protect information sent over the client and the server?


Options are :

  • SSL
  • S / MIME
  • SSH
  • None
  • FTP

Answer : SSL

Which of the following statements IPSec is not true?


Options are :

  • ESP provides data integrity, authentication and encryption of IP datagrams
  • A security association is defined in two IPSec systems for two-way communication is established.
  • None
  • Transport mode, ESP encrypts only the data payload of each packet.
  • The integrity and authentication for IP datagrams are AH.

Answer : A security association is defined in two IPSec systems for two-way communication is established.

In order to ensure the privacy and integrity of connections through firewalls over public networks should be used:


Options are :

  • digital certificates
  • encryption
  • screened subnet
  • The encrypted VPN
  • None

Answer : The encrypted VPN

CISSP Security Engineering Certification Practical Exam Set 4

Logical Link Control sub-layer is a part of, which of the following?


Options are :

  • None
  • Change management.
  • Reference monitor.
  • ISO / OSI data link layer.
  • Transport layer of the TCP / IP stack model.

Answer : ISO / OSI data link layer.

SMTP can be best described as:


Options are :

  • determining the standard form e-mail messages.
  • email search protocol
  • web-based e-mail reading protocol.
  • None
  • host-to-host protocol email

Answer : host-to-host protocol email

Every layer of the TCP / IP protocol stack is responsible for the ISO / OSI Network (layer 3)?


Options are :

  • Host-to-host layer,
  • Session layer
  • Access to the network layer
  • None
  • Internet layer

Answer : Internet layer

CISSP Security and Risk Management Certified Practice Exam Set 1

What is the main difference between FTP and TFTP?


Options are :

  • speed negotiation
  • Authentication
  • TFTP is used to transfer configuration files and network equipment.
  • None
  • The ability to automate

Answer : Authentication

Why infrared tend to be safer than the multidirectional interception of radio transmissions?


Options are :

  • None
  • Since infrared eavesdropping requires sophisticated equipment.
  • .As infrared requires a direct line-of-sight paths
  • Because infrared operates only over short distances
  • Since the infrared operates at extremely low frequencies (ELF).

Answer : .As infrared requires a direct line-of-sight paths

Which of the following protocols is designed to transmit individual messages securely?


Options are :

  • Kerberos
  • None
  • Secure Sockets Layer (SSL).
  • Secure Electronic Transaction (SET).
  • Secure HTTP (S-HTTP)

Answer : Secure HTTP (S-HTTP)

CISSP-ISSAP Information Systems Security Architecture Exam Set 6

Which of the following is not an IPSec components?


Options are :

  • None
  • Authentication Header
  • Encapsulating Security Payload
  • Key Distribution Center
  • Internet Key Exchange

Answer : Key Distribution Center

Authentication Headers (AH) and Encapsulating Security Payload (ESP) protocols are the driving force IPSec. Authentication Headers (AH) provides the following services except:


Options are :

  • Authentication
  • confidence
  • Re-resistance and non-repudiations
  • None
  • integrity

Answer : confidence

Why fiber-optic communication is a significant safety advantage over other transmission technology?


Options are :

  • None
  • , Higher data rates can be transmitted.
  • Traffic analysis to prevent multiplexing.
  • Single and double-bit errors are correctable.
  • Capture data traffic is more difficult.

Answer : Capture data traffic is more difficult.

CISSP-ISSEP Information Systems Security Engineering Exam Set 2

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

Subscribe to See Videos

Subscribe to my Youtube channel for new videos : Subscribe Now