CISSP Communication and Network Security Practice Exam Set 4

Which of the following statements pertaining to PPTP (Point-to-Point Tunneling Protocol) is NOT true?


Options are :

  • PPTP allows the tunneling of any protocols that can be carried within PPP.
  • PPTP does not support any token-based authentication method for users.
  • PPTP is derived from L2TP.
  • PPTP does not provide strong encryption.

Answer : PPTP is derived from L2TP.

CISSP - Security Operations Mock Questions

Which of the following statements pertaining to IPSec is NOT true?


Options are :

  • ESP provides for integrity, authentication and encryption to IP datagrams
  • A security association has to be defined between two IPSec systems in order for bidirectional communication to be established.
  • In transport mode, ESP only encrypts the data payload of each packet.
  • Integrity and authentication for IP datagrams are provided by AH.

Answer : A security association has to be defined between two IPSec systems in order for bidirectional communication to be established.

In IPSec, if the communication is to be gateway-to-gateway or host-to-gateway:


Options are :

  • Both tunnel and transport mode can be used
  • Tunnel mode of operation is required
  • Encapsulating Security Payload (ESP) authentication must be used
  • Only transport mode can be used

Answer : Tunnel mode of operation is required

Address Resolution Protocol (ARP) interrogates the network by sending out a?


Options are :

  • unicast.
  • broadcast.
  • semicast.
  • multicast.

Answer : broadcast.

Which layer of the OSI/ISO model handles physical addressing, network topology, line discipline, error notification, orderly delivery of frames, and optional flow control?


Options are :

  • Physical
  • Session
  • Network
  • Data link

Answer : Data link

Which of the following cable types is limited in length to 185 meters?


Options are :

  • 10Base5
  • 10BaseT
  • RG58
  • 10BaseT

Answer : RG58

Which of the following is NOT a common weakness of packet filtering firewalls?


Options are :

  • Vulnerability to IP spoofing.
  • Limited logging functionality
  • No support for advanced user authentication schemes.
  • Vulnerability to denial-of-service and related attacks

Answer : Vulnerability to IP spoofing.

CISSP Security Engineering Certification Practice Exam Set 6

Communications devices must operate:


Options are :

  • at high speed to interact.
  • at different speeds to communicate.
  • at varying speeds to interact.
  • at the same speed to communicate.

Answer : at the same speed to communicate.

Which of the following remote access authentication systems is the MOST robust?


Options are :

  • TACACS
  • TACACS+
  • PAP
  • RADIUS

Answer : TACACS+

Which of the following can prevent hijacking of a web session?


Options are :

  • PPP
  • SET
  • SSL
  • RSA

Answer : SSL

The Domain Name System (DNS) is a global network of:


Options are :

  • clients that provide these Domain Name Services
  • hosts that provide these Domain Name Services
  • workstations that provide these Domain Name Services
  • servers that provide these Domain Name Services.

Answer : servers that provide these Domain Name Services.

CISSP Security Assessment Testing Security Operations Exam Set 4

Which of the following is a Wide Area Network that was originally funded by the Department of Defense, which uses TCP/IP for data interchange?


Options are :

  • The Internet.
  • The Ethernet.
  • The Intranet.
  • The extranet.

Answer : The Internet.

The basic language of modems and dial-up remote access systems is:


Options are :

  • Asynchronous Communication
  • Synchronous Communication.
  • Asynchronous Interaction.
  • Synchronous Interaction.

Answer : Asynchronous Communication

What is the framing specification used for transmitting digital signals at 1.544 Mbps on a T1 facility?


Options are :

  • DS-1
  • DS-3
  • DS-0
  • DS-2

Answer : DS-1

Which of the following statements pertaining to VPN protocol standards is false?


Options are :

  • L2TP and PPTP were designed for single point-to-point client to server communication.
  • PPTP uses native PPP authentication and encryption services.
  • L2TP is a combination of PPTP and L2F.
  • L2TP operates at the network layer.

Answer : L2TP operates at the network layer.

Which of the following is a LAN transmission method?


Options are :

  • Carrier-sense multiple access with collision detection (CSMA/CD)
  • Token ring
  • Fiber Distributed Data Interface (FDDI)
  • Broadcast

Answer : Broadcast

An intranet is an Internet-like logical network that uses:


Options are :

  • a firm's external, physical network infrastructure
  • a firm's internal, physical network infrastructure
  • a firm's external, physical netBIOS infrastructure
  • a firm's internal, physical netBIOS infrastructure

Answer : a firm's internal, physical network infrastructure

CISSP-ISSEP Information Systems Security Engineering Exam Set 5

Which of the following Common Data Network Services is used to send and receive email internally or externally through an email gateway device?


Options are :

  • Client/Server services.
  • Mail services.
  • File services.
  • Print services.

Answer : Mail services.

In the UTP category rating, the tighter the wind:


Options are :

  • the shorter the rating and its resistance against interference and attenuation
  • the slower the rating and its resistance against interference and attenuation.
  • the longer the rating and its resistance against interference and attenuation.
  • the higher the rating and its resistance against interference and crosstalk.

Answer : the higher the rating and its resistance against interference and crosstalk.

Which of the following is the BIGGEST concern with firewall security?


Options are :

  • Distributed denial of service (DDoS) attacks
  • Internal hackers
  • Complex configuration rules leading to misconfiguration

Answer : Complex configuration rules leading to misconfiguration

Which of the following statements pertaining to packet switching is NOT true?


Options are :

  • Each network node or point examines each packet for routing
  • Messages are divided into packets.
  • All packets from a message travel through the same route.
  • Most data sent today uses digital signals over network employing packet switching.

Answer : All packets from a message travel through the same route.

What works as an E-mail message transfer agent?


Options are :

  • SMTP
  • SNMP
  • S/MIME
  • S-RPC

Answer : SMTP

Which xDSL flavor, appropriate for home or small offices, delivers more bandwidth downstream than upstream and over longer distance?


Options are :

  • SDSL
  • ADSL
  • ADSL
  • VDSL

Answer : ADSL

CISSP Security and Risk Management Certified Practice Exam Set 2

Which of the following Common Data Network Services is used to print documents to a shared printer or a print queue/spooler?


Options are :

  • Domain Name Service
  • Print services.
  • Client/Server services.
  • Mail services.

Answer : Print services.

What layer of the OSI/ISO model does Point-to-point tunneling protocol (PPTP) work at


Options are :

  • Transport layer
  • Data link layer
  • Session layer
  • Network layer

Answer : Data link layer

Which of the following Common Data Network Services is used to share data files and subdirectories on file servers?


Options are :

  • Mail services.
  • Print services.
  • Client/Server services
  • File services.

Answer : File services.

An intranet provides more security and control than which of the following:


Options are :

  • public posting on the Extranet.
  • private posting on the Internet.
  • public posting on the Ethernet.
  • public posting on the Internet.

Answer : public posting on the Internet.

Which of the following category of UTP cables is specified to be able to handle gigabit Ethernet (1 Gbps) according to the EIA/TIA-568-B standards?


Options are :

  • Category 1e UTP
  • Category 2 UTP
  • Category 3 UTP
  • Category 5e UTP

Answer : Category 5e UTP

Which of the following Common Data Network Services allocates computing power resources among workstations with some shared resources centralized on a server?


Options are :

  • Client/Server services
  • Print services
  • Domain Name Service
  • File services

Answer : Client/Server services

CISSP Security Engineering Certification Practice Exam Set 2

Which of the following protects Kerberos against replay attacks?


Options are :

  • Tokens
  • Time stamps
  • Passwords
  • Cryptography

Answer : Time stamps

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

Subscribe to See Videos

Subscribe to my Youtube channel for new videos : Subscribe Now