CISSP Communication and Network Security Practice Exam Set 5

Which of the following is an IP address, which is a private (that is reserved for internal networks, rather than a valid address used on the Internet)?


Options are :

  • 10.0.42.5
  • None
  • 12.0.42.5
  • 13.0.42.5
  • 11.0.42.5

Answer : 10.0.42.5

CISSP-ISSAP Information Systems Security Architecture Exam Set 5

Which of the following media most resistant to tapping?


Options are :

  • None
  • coaxial cable
  • The optical fiber.
  • Twisted pair.
  • Microwave oven.

Answer : The optical fiber.

This type of attack, the intruder re-routed to the network device data traffic personal device. This migration may allow the attacker to access critical resources and user data such as passwords, and unauthorized access to critical systems in the organization. Opt for the best selection below.


Options are :

  • Network Address supernetting
  • None
  • Network Address Capture
  • address conversion
  • Network Address snorting

Answer : Network Address Capture

Which of the following traffic type can be easily filtered stateful packet filter by controlling the connection or government request?


Options are :

  • UDP
  • None
  • ICMP
  • TCP
  • P.M

Answer : TCP

CISSP - Software Development Security Mock Questions

What is called the attack in which the attacker spoofs the source IP address of ICMP ECHO broadcast package so it seems to have originated at the victim's system, in order to flood the ANSWER packages?


Options are :

  • None
  • Denial of Service (DoS)
  • Smurf attack
  • SYN Flood attack
  • Ping of Death attack

Answer : Smurf attack

Looking at the options below, what would be the most appropriate protocols / tools for securing the e-mail?


Options are :

  • IPSec and IKE
  • PGP and S / MIME
  • SSH
  • None
  • TLS and SSL

Answer : PGP and S / MIME

With the OSI model are related to protocols is located on TCP / IP protocols?


Options are :

  • transport layer
  • application layer
  • None
  • physical layer
  • the network layer

Answer : transport layer

CISSP Security Engineering Certification Practical Exam Set 8

Which of the following is NOT a way to make sure your wireless network?


Options are :

  • Put the access points (AP) in a location protected by a firewall
  • Give descriptive names AP
  • None
  • Removes the broadcast SSID configuration within AP's
  • Change the default values of AP

Answer : Give descriptive names AP

Which of the following is true for information security?


Options are :

  • A firewall is not a necessity in today's networked world.
  • Black A firewall is a necessity in today's networked world.
  • A firewall is a necessity in today's networked world.
  • None
  • White Wall is a necessity in today's networked world

Answer : A firewall is a necessity in today's networked world.

Frame Relay and X.25 networks are part of which of the following?


Options are :

  • The cell-switched services
  • Packet-switched services
  • circuit-switched services
  • None
  • .Dedicated digital services

Answer : Packet-switched services

CISSP Security Engineering Certification Practical Exam Set 7

Whose conceptual approach to Intrusion Detection System is the most common?


Options are :

  • Host-based intrusion detection
  • intrusion detection based on behavior
  • The statistical deviation-based intrusion detection
  • None
  • intrusion detection based on knowledge

Answer : intrusion detection based on knowledge

What is the limitation of TCP Wrappers?


Options are :

  • None
  • It can not control access to running UDP services.
  • The hosts. * Access control system requires a complex directory tree.
  • It will stop packets before they reach the application level, which will confuse some proxy servers.
  • They are too expensive.

Answer : It can not control access to running UDP services.

When reference is made to the term packet data structures Protocol Data Unit (PDU) is used, which is correct, the term refers to a unit of data in a TCP transport layer?


Options are :

  • None
  • TCP frame.
  • The TCP packet.
  • TCP segment.
  • TCP message.

Answer : TCP segment.

CISSP - Software Development Security Mock Questions

Where the layer ISO / OSI does fiber optics work?


Options are :

  • transport layer
  • physical layer
  • None
  • the network layer
  • DataLink Layer

Answer : physical layer

Which of the following is true regarding the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?


Options are :

  • TCP is a connection-oriented, UDP is not
  • None
  • TCP does not guarantee the delivery of data, while UDP does not guarantee data delivery.
  • UDP provides error correction, TCP does not
  • UDP is useful for long messages, rather than TCP

Answer : TCP is a connection-oriented, UDP is not

Which of the following DoD Model layer provides non-repudiation services?


Options are :

  • Application Layer.
  • None
  • Transport Layer.
  • The data link layer.
  • At network level.

Answer : Application Layer.

CISSP - Security and Risk Management Pratice Questions

Tim's daily tasks include monitoring the health of devices on the network. He used to support SNMP network monitoring system to track equipment abnormalities or high flowing through interfaces.Which protocols would be best used if some of the requirements is to prevent easy detection of SNMP strings and authentication source package?


Options are :

  • SNMP V1
  • SNMP V2
  • SNMP V3
  • None
  • UDP

Answer : SNMP V1

In the days preceding CIDR (Classless Internet Domain Routing), the networks were generally organized classes. Which of the following would have been a true Class C network?


Options are :

  • The first bit of the IP address should be set to one and the other bit is set to zero.
  • The first three bits of the IP address should be set to one.
  • The first two bits of the IP address should be set to one, and the third bit is set to zero.
  • The first bit of the IP address should be set to zero
  • None

Answer : The first two bits of the IP address should be set to one, and the third bit is set to zero.

OSI model, what floor are some of SLIP, CSLIP, PPP control functions?


Options are :

  • Transport
  • None
  • application
  • data Connection
  • demonstration

Answer : data Connection

CISSP - Software Development Security Mock Questions

ICMP and IGMP belong to which layer of the OSI model?


Options are :

  • Transport Layer.
  • None
  • Datagram Layer.
  • The Data Link Layer.
  • At network level.

Answer : At network level.

Which of the following is NOT correct notation IPv6 address?


Options are :

  • None
  • ABCD: ef01: 2345: 6789 :: 1
  • ABCD: ef01: 2345: 6789:
  • 2001: 0db8: 0: 0: 0: 0: 1428: 57ab
  • 2001: DB8 :: 8: 800 :: 417A

Answer : 2001: DB8 :: 8: 800 :: 417A

SSL / TLS protocol, what kind of authentication is supported when you set up a secure session, the client and server?


Options are :

  • Server authentication (mandatory) and client authentication (optional)
  • Peer-to-peer authentication
  • Only server authentication (optional)
  • None
  • Role-based authentication scheme

Answer : Server authentication (mandatory) and client authentication (optional)

CISSP - Security Assessment and Testing Mock

The IP header contains a protocol field. If this field has a value of 2, what kind of information is within the datagram?


Options are :

  • TCP.
  • IGMP.
  • None
  • UDP
  • ICMP

Answer : IGMP.

Which of the following is a tool often used to reduce the risk of a local area network (LAN), which is the external connections by filtering traffic Ingress and egress?


Options are :

  • Passwords.
  • Party wall.
  • None
  • Dial-up
  • .Fiber optics.

Answer : Party wall.

The standard HTTP server port number is which of the following?


Options are :

  • 81
  • 8080
  • None
  • 8180
  • 80

Answer : 80

CISSP Security Engineering Certification Practice Exam Set 6

In the days preceding CIDR (Classless Internet Domain Routing), the networks were generally organized classes. What would have been the following is true Class A network?


Options are :

  • The first two bits of the IP address should be set to one, and the third bit is set to zero
  • The first three bits of the IP address should be set to one
  • The first bit of the IP address should be set to one and the other bit is set to zero.
  • None
  • The first bit of the IP address would be zero.

Answer : The first bit of the IP address would be zero.

Which of the following is an IP address, which is a private (that is reserved for internal networks, rather than a valid address used on the Internet)?


Options are :

  • None
  • 192.168.42.5
  • 192.166.42.5
  • 192.175.42.5
  • 192.1.42.5

Answer : 192.168.42.5

What is the 802.11 standard had been given?


Options are :

  • Public Key Infrastructure (PKI)
  • None
  • OSI / ISO model
  • Wireless network communication
  • Packet switching technology

Answer : Wireless network communication

CISSP Communication and Network Security Practice Exam Set 6

Which device acts as a translator is used to connect two networks or applications up to Layer 4 Layer 7 of the ISO / OSI model?


Options are :

  • repeater
  • Bridge
  • router
  • port
  • None

Answer : port

The IP header contains a protocol field. If this field contains a value of 1, what kind of information is within the datagram?


Options are :

  • CMP.
  • UDP
  • None
  • GMP.
  • TCP.

Answer : CMP.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions