CISSP Communication and Network Security Practice Exam Set 6

What is the reduced amplitude signal propagates along the transmission medium known as the BEST?


Options are :

  • noise
  • a delay interference
  • Attenuation
  • None
  • crosstalk

Answer : Attenuation

CISSP - Software Development Security Mock Questions

In the Open Systems Interconnect (OSI) Reference Model, the level at which the TCP and UDP are offered?


Options are :

  • None
  • network
  • application
  • Transport
  • demonstration

Answer : Transport

What is the correct term refers to a single unit of IP data?


Options are :

  • IP segment.
  • datagram
  • IP frame
  • None
  • IP fragment.

Answer : datagram

Loki attack takes advantage of the secret channel by using that protocol?


Options are :

  • SMTP
  • PPP
  • ICMP
  • TCP
  • None

Answer : ICMP

CISSP Security Engineering Certification Practice Exam Set 1

How to distinguish between a bridge and a router?


Options are :

  • The bridge is a type of router used to connect to a local area network to the global Internet.
  • The bridge simply to connect to multiple networks, the router will examine each packet to determine which network to forward it.
  • The bridge connecting a plurality of networks, a data link layer, while the router connects multiple networks to the network layer.
  • "Bridge" and "router" are synonymous devices are used to connect two networks.
  • None

Answer : The bridge connecting a plurality of networks, a data link layer, while the router connects multiple networks to the network layer.

Which of the following is most affected by denial-of-service (DoS)?


Options are :

  • None
  • confidence
  • Availability
  • integrity
  • accountability

Answer : Availability

Which of the following transmission network would not be influenced by cross talk or interference?


Options are :

  • None
  • satellite radio connection
  • radio System
  • copper cable
  • fiber optic cable

Answer : fiber optic cable

CISSP - Security Operations Mock Questions

Every layer handles the Media Access Control (MAC) addresses?


Options are :

  • physical layer
  • DataLink Layer
  • the network layer
  • None
  • transport layer

Answer : DataLink Layer

Remote Procedure Call (RPC) is a protocol that one program can use to request a service program is located on another computer on the web. Within which the OSI / ISO layer RPC is carried out?


Options are :

  • Session layer
  • None
  • DataLink Layer
  • the network layer
  • transport layer

Answer : Session layer

Which of the following is usually not benefit from the use of firewalls?


Options are :

  • Reduces the level of threat to the internal system.
  • Reduces the risk of external threats hackers.
  • Prevents the spread of viruses.
  • Allows centralized management and control services.
  • None

Answer : Prevents the spread of viruses.

CISSP Security Assessment Testing Security Operations Exam Set 1

The following, which is a multiple access method for computer networks is not 802.11 Wireless Local Area Network access?


Options are :

  • CSMA / CA
  • CSMA / CD
  • 802.11 does not support multiple access methods
  • 802.11 RTS / CTS Exchange
  • None

Answer : CSMA / CA

CISSP - Software Development Security Mock Questions

Which of the following is an advantage of proxies?


Options are :

  • Proxies provides a single point of access, control and logging.
  • Proxy documents should be there for each service.
  • None
  • Proxy servers are protected by a basic operating system
  • Powers of attorney to create a single point of failure.

Answer : Proxies provides a single point of access, control and logging.

Which of the following is an expansion of Network Address Translation, which allows multiple devices to the provision of services in a local area network (LAN) is mapped to a single public IP address?


Options are :

  • Port Address Translation
  • IP Distribution
  • IP subnetting
  • None
  • IP spoofing

Answer : Port Address Translation

Which of the following is a disadvantage of fiber optic cables?


Options are :

  • It can be easily utilized.
  • None
  • Limited distance at high speeds.
  • It affects the electromagnetic interference (EMI)
  • The expertise required to install it.

Answer : The expertise required to install it.

CISSP Security and Risk Management Certified Practice Exam Set 3

Which of the following is not a counter-measure traffic analysis?


Options are :

  • Tap.
  • Padding messages.
  • By submitting a noise.
  • Faraday cage
  • None

Answer : Tap.

The package's firewall inspects the data packet to obtain information about the source and destination addresses of an incoming packet, the protocol (TCP, UDP, or ICMP), and source and destination port for:


Options are :

  • delayed.
  • expert
  • shared service.
  • None
  • the desired service.

Answer : the desired service.

What is the IP routing table?


Options are :

  • List of host names and corresponding IP addresses
  • List of IP addresses and corresponding MAC addresses.
  • List of the current network connection, an IP routing is enabled
  • List of the station and the network addresses to the corresponding gateway IP address,
  • None

Answer : List of the station and the network addresses to the corresponding gateway IP address,

CISSP Security Engineering Certification Practice Exam Set 5

Which of the following are additional terms used to describe a knowledge-based and behavior-based IDS IDS?


Options are :

  • Signature-IDS and dynamic anomaly-IDS, respectively.
  • Grievance-based IDS and statistical-based IDS, respectively.
  • Grievance-based IDS and statistical-based IDS, respectively.
  • None
  • Signature-based IDS and the statistical deviation-based IDS, respectively.

Answer : Signature-based IDS and the statistical deviation-based IDS, respectively.

When the outgoing call is the port number is greater than 1023, a firewall will create this type of ACL, so that a response from that port to transmit:


Options are :

  • packet filtering
  • Dynamic packet filtering
  • At the district level proxy
  • None
  • The application layer proxy

Answer : Dynamic packet filtering

Which of the following answers may be found in the most significant threat to the network IDS or IPS systems?


Options are :

  • Complex IDS / IPS Signature Syntax
  • Digitally-signed packages
  • None
  • separate VLANs
  • encrypted traffic

Answer : encrypted traffic

CISSP Communication and Network Security Practice Exam Set 3

Which of the following would be excluded from the firewall easy communication and the use of users?


Options are :

  • None
  • OSPF
  • REST IN PEACE
  • DNS
  • IGRP

Answer : DNS

Cable technology refers to the CAT3 and CAT5 classes?


Options are :

  • coaxial cables
  • Twisted Pair cables
  • Coaxial cable
  • fiber optic cable
  • None

Answer : Twisted Pair cables

Which of the following statements pertaining to firewalls is not true?


Options are :

  • Firewalls allow centralization of security services engine and optimized for its function.
  • Firewalls are used to create the security check at the borders of private networks.
  • Firewalls create bottlenecks in the internal and external network
  • Firewalls protect the network at all layers of the OSI model
  • None

Answer : Firewalls protect the network at all layers of the OSI model

CISSP Security and Risk Management Certified Practice Exam Set 2

Circuit proxy server is ____________ compared to application-level proxy.


Options are :

  • None
  • safer.
  • slower
  • harder to maintain.
  • less processing.

Answer : less processing.

A number of analytical methods can be employed by the IDS, each with their own strengths and weaknesses, and their suitability for any particular situation should be carefully considered. There are two basic types of IDS analysis methods exist.Which basic method is prone to false positives?


Options are :

  • Pattern matching (also called signature analysis)
  • .Host-based intrusion detection
  • anomaly detection
  • None
  • Network intrusion detection

Answer : anomaly detection

Which of the following service is a distributed database that translates machine name to an IP address in the IP address of the host name?


Options are :

  • None
  • DNS
  • FTP
  • SSH
  • SMTP

Answer : DNS

CISSP Security Engineering Certification Practical Exam Set 2

The organization must be taken into consideration, which of the following before allowing external access to their local networks via the Internet?


Options are :

  • The plan provides the user with his or her account usage information.
  • Plan will consider the appropriate authentication options.
  • None
  • Plan to protect the modem bank.
  • Recommendations for the implementation of workstation locking mechanisms.

Answer : Plan will consider the appropriate authentication options.

Application Layer Firewalls work is:


Options are :

  • OSI protocol layer of six, the presentation layer.
  • OSI protocol layer four, the Transport Layer.
  • None
  • OSI seven layer protocol, the Application Layer.
  • OSI protocol layer five, the Session Layer.

Answer : OSI seven layer protocol, the Application Layer.

What is the best answer related to the difference between session and transport layers of the OSI model?


Options are :

  • Session layer provides for communication between, while the Transport layer protocols to establish connections
  • Session layer provides the protocols, the transport layer to establish connections between computer systems in communication.
  • The transfer layer is formed for communication between, while the session layer provides connections to applications.
  • None
  • None

Answer : The transfer layer is formed for communication between, while the session layer provides connections to applications.

CISSP Asset Security Final Document Trabslate Practice Exam Set 3

What is called the attack in which the attacker floods the system with connection requests but does not react with the target system replies to these requests?


Options are :

  • Ping of death attack
  • Smurf attack
  • SYN attack
  • None
  • A buffer overflow attack

Answer : SYN attack

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions