CISSP Communication and Network Security Practice Exam Set 2

Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer in a network. Within which OSI/ISO layer is RPC implemented?


Options are :

  • Transport layer
  • Network layer
  • Session layer
  • Data link layer

Answer : Session layer

How do you distinguish between a bridge and a router?


Options are :

  • A bridge simply connects multiple networks, a router examines each packet to determine which network to forward it to.
  • The bridge connects multiple networks at the data link layer, while router connects multiple networks at the network layer.
  • "Bridge" and "router" are synonyms for equipment used to join two networks.
  • The bridge is a specific type of router used to connect a LAN to the global Internet.

Answer : The bridge connects multiple networks at the data link layer, while router connects multiple networks at the network layer.

In SSL/TLS protocol, what kind of authentication is supported when you establish a secure session between a client and a server?


Options are :

  • Only server authentication (optional)
  • Server authentication (mandatory) and client authentication (optional)
  • Role based authentication scheme
  • Peer-to-peer authentication

Answer : Server authentication (mandatory) and client authentication (optional)

CISSP Security Engineering Certification Practice Exam Set 6

Which layer deals with Media Access Control (MAC) addresses?


Options are :

  • Transport layer
  • Physical layer
  • Network layer
  • Data link layer

Answer : Data link layer

Which of the following type of traffic can easily be filtered with a stateful packet filter by enforcing the context or state of the request?


Options are :

  • IP
  • UDP
  • ICMP
  • TCP

Answer : TCP

In which layer of the OSI Model are connection-oriented protocols located in the TCP/IP suite of protocols?


Options are :

  • Physical layer
  • Network layer
  • Transport layer
  • Application layer

Answer : Transport layer

Tim's day to day responsibilities include monitoring health of devices on the network. He uses a Network Monitoring System supporting SNMP to monitor the devices for any anomalies or high traffic passing through the interfaces.Which of the protocols would be BEST to use if some of the requirements are to prevent easy disclosure of the SNMP strings and authentication of the source of the packets?


Options are :

  • SNMP V1
  • SNMP V2
  • SNMP V3
  • UDP

Answer : SNMP V1

At which layer of ISO/OSI does the fiber optics work?


Options are :

  • Data link layer
  • Transport layer
  • Physical layer
  • Network layer

Answer : Physical layer

Which of the following is TRUE of network security?


Options are :

  • A black firewall is a necessity in today's connected world.
  • A whitewall is a necessity in today's connected world
  • A firewall is a necessity in today's connected world.
  • A firewall is a not a necessity in today's connected world.

Answer : A firewall is a necessity in today's connected world.

CISSP - Security Assessment and Testing Mock

Which of the following is NOT a correct notation for an IPv6 address?


Options are :

  • ABCD:EF01:2345:6789::1
  • 2001:0db8:0:0:0:0:1428:57ab
  • 2001:DB8::8:800::417A
  • ABCD:EF01:2345:6789:

Answer : 2001:DB8::8:800::417A

The Loki attack exploits a covert channel using which network protocol?


Options are :

  • TCP
  • PPP
  • SMTP
  • ICMP

Answer : ICMP

What is a limitation of TCP Wrappers?


Options are :

  • It stops packets before they reach the application layer, thus confusing some proxy servers.
  • The hosts.* access control system requires a complicated directory tree.
  • They are too expensive.
  • It cannot control access to running UDP services.

Answer : It cannot control access to running UDP services.

The IP header contains a protocol field. If this field contains the value of 1, what type of data is contained within the IP datagram?


Options are :

  • GMP.
  • CMP.
  • UDP
  • TCP.

Answer : CMP.

What is the proper term to refer to a single unit of IP data?


Options are :

  • IP fragment.
  • IP segment.
  • IP datagram
  • IP frame

Answer : IP datagram

Which of the following is an IP address that is private (i.e. reserved for internal networks, and not a valid address to use on the Internet)?


Options are :

  • 10.0.42.5
  • 12.0.42.5
  • 11.0.42.5
  • 13.0.42.5

Answer : 10.0.42.5

CISSP - Security and Risk Management Pratice Questions

Which of the following is a tool often used to reduce the risk to a local area network (LAN) that has external connections by filtering Ingress and Egress traffic?


Options are :

  • Passwords.
  • A firewall.
  • Dial-up
  • .Fiber optics.

Answer : A firewall.

Which of the following transmission media would NOT be affected by cross talk or interference?


Options are :

  • Copper cable
  • Satellite radiolink
  • Radio System
  • Fiber optic cables

Answer : Fiber optic cables

ICMP and IGMP belong to which layer of the OSI model?


Options are :

  • Network Layer.
  • Data Link Layer.
  • Transport Layer.
  • Datagram Layer.

Answer : Network Layer.

Which of the following media is MOST resistant to tapping?


Options are :

  • Fiber optic.
  • Coaxial cable
  • Twisted pair.
  • Microwave.

Answer : Fiber optic.

The standard server port number for HTTP is which of the following?


Options are :

  • 8180
  • 81
  • 80
  • 8080

Answer : 80

What is the 802.11 standard related to?


Options are :

  • Packet-switching technology
  • Public Key Infrastructure (PKI)
  • Wireless network communications
  • The OSI/ISO model

Answer : Wireless network communications

CISSP - Security Assessment and Testing Mock

When referring to the data structures of a packet, the term Protocol Data Unit (PDU) is used, what is the proper term to refer to a single unit of TCP data at the transport layer?


Options are :

  • TCP datagram.
  • TCP frame.
  • TCP packet.
  • TCP segment.

Answer : TCP segment.

Within the OSI model, at what layer are some of the SLIP, CSLIP, PPP control functions provided?


Options are :

  • Transport
  • Presentation
  • Application
  • Data Link

Answer : Data Link

In the days before CIDR (Classless Internet Domain Routing), networks were commonly organized by classes. Which of the following would have been true of a Class C network?


Options are :

  • The first bit of the IP address would be set to one and the second bit set to zero.
  • The first three bits of the IP address would be set to one.
  • The first bit of the IP address would be set to zero
  • The first two bits of the IP address would be set to one, and the third bit set to zero.

Answer : The first two bits of the IP address would be set to one, and the third bit set to zero.

Which one of the following is usually not a benefit resulting from the use of firewalls?


Options are :

  • Reduces the risks of external threats from malicious hackers.
  • Prevents the spread of viruses.
  • Allows centralized management and control of services.
  • Reduces the threat level on internal system.

Answer : Prevents the spread of viruses.

Frame relay and X.25 networks are part of which of the following?


Options are :

  • Packet-switched services
  • Circuit-switched services
  • .Dedicated digital services
  • Cell-switched services

Answer : Packet-switched services

Which device acting as a translator is used to connect two networks or applications from Layer 4 up to Layer 7 of the ISO/OSI Model?


Options are :

  • Gateway
  • Router
  • Repeater
  • Bridge

Answer : Gateway

CISSP Security Engineering Certification Practical Exam Set 8

What is the primary difference between FTP and TFTP?


Options are :

  • TFTP is used to transfer configuration files to and from network equipment.
  • Authentication
  • Ability to automate
  • Speed of negotiation

Answer : Authentication

During the initial stage of configuration of your firewall, which of the following rules appearing in an Internet firewall policy is inappropriate?


Options are :

  • Appropriate firewall documentation and a copy of the rulebase shall be maintained on offline storage at all times
  • The firewall should be tested online first to validate proper configuration.
  • The firewall software shall run on a dedicated computer
  • The firewall shall be configured to deny all services not expressly permitted.

Answer : The firewall should be tested online first to validate proper configuration.

When a station communicates on the network for the first time, which of the following protocol would search for and find the Internet Protocol (IP) address that matches with a known Ethernet address?


Options are :

  • Internet Control Message protocol (ICMP)
  • Address Resolution Protocol (ARP)
  • User Datagram Protocol (UDP).
  • Reverse Address Resolution Protocol (RARP).

Answer : Reverse Address Resolution Protocol (RARP).

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

Subscribe to See Videos

Subscribe to my Youtube channel for new videos : Subscribe Now