CISSP Communication and Network Security Practice Exam Set 5

Asynchronous Communication transfers data by sending:


Options are :

  • bits of data sequentially in irregular timing patterns (Correct)
  • bits of data simultaneously
  • bits of data in sync with a heartbeat or clock
  • bits of data sequentially

Answer : bits of data sequentially in irregular timing patterns

Which of the following technologies has been developed to support TCP/IP networking over low-speed serial interfaces?


Options are :

  • xDSL
  • ISDN
  • T1
  • SLIP (Correct)

Answer : SLIP

Which of the following offers security to wireless communications?


Options are :

  • S-WAP
  • WDP
  • WTLS (Correct)
  • WTLS

Answer : WTLS

Which of the following is NOT an advantage that TACACS+ has over TACACS?


Options are :

  • Event logging (Correct)
  • Ability for security tokens to be resynchronized
  • User has the ability to change his password
  • Use of two-factor password authentication

Answer : Event logging

n which LAN transmission method is a source packet copied and sent to specific multiple destinations but not ALL of the destinations on the network?


Options are :

  • Unicast
  • Multicas (Correct)
  • Overcast
  • Broadcast

Answer : Multicas

CISSP - Mock Questions with all domains

Unshielded Twisted Pair cabling is a:


Options are :

  • one-pair wire medium that is used in a variety of networks.
  • four-pair wire medium that is used in a variety of networks. (Correct)
  • wo-pair wire medium that is used in a variety of networks.
  • three-pair wire medium that is used in a variety of networks.

Answer : four-pair wire medium that is used in a variety of networks.

The communications products and services, which ensure that the various components of a network (such as devices, protocols, and access methods) work together refers to:


Options are :

  • WAN Architecture.
  • Network Architecture. (Correct)
  • Netware Architecture.
  • Multiprotocol Architecture.

Answer : Network Architecture.

Which IPSec operational mode encrypts the entire data packet (including header and data) into an IPSec packet?


Options are :

  • Transport mode
  • Safe mode
  • Tunnel mode (Correct)
  • Authentication mode

Answer : Tunnel mode

Which of the following LAN devices only operates at the physical layer of the OSI/ISO model?


Options are :

  • Router
  • Switch
  • Hub (Correct)
  • Bridge

Answer : Hub

In what LAN topology do all the transmissions of the network travel the full length of cable and are received by all other stations?


Options are :

  • FDDI topology
  • Star topology
  • Bus topology (Correct)
  • Ring topology

Answer : Bus topology

Which of the following IEEE standards defines the token ring media access method?


Options are :

  • 802.11
  • 802.3
  • 802.5 (Correct)
  • 802.2

Answer : 802.5

CISSP Security Engineering Certification Practice Exam Set 3

Domain Name Service is a distributed database system that is used to map:


Options are :

  • MAC Address to IP addresses.
  • MAC addresses to domain names.
  • Domain Name to IP addresses. (Correct)
  • IP addresses to MAC Addresses.

Answer : Domain Name to IP addresses.

Another name for a VPN is a:


Options are :

  • pipeline
  • tunnel (Correct)
  • one-time password
  • bypass

Answer : tunnel

Which of the following is the SIMPLEST type of firewall?


Options are :

  • Stateful packet filtering firewall
  • Application gateway
  • Dual-homed host firewall
  • Packet filtering firewall (Correct)

Answer : Packet filtering firewall

Layer 2 of the OSI model has two sublayers. What are those sublayers, and what are two IEEE standards that describe technologies at that layer?


Options are :

  • LLC and MAC; IEEE 802.2 and 802.3
  • LLC and MAC; IEEE 802.1 and 802.3
  • LLC and MAC; IEEE 802.2 and 802.3
  • Network and MAC; IEEE 802.1 and 802.3 (Correct)

Answer : Network and MAC; IEEE 802.1 and 802.3

Which of the following devices enables more than one signal to be sent out simultaneously over one physical circuit?


Options are :

  • Wan switch
  • Channel service unit/Data service unit (CSU/DSU)
  • Multiplexer (Correct)
  • Router

Answer : Multiplexer

What is defined as the rules for communicating between computers on a Local Area Network (LAN)?


Options are :

  • Contention Access Control
  • LAN topologies
  • LAN Media Access methods (Correct)
  • LAN transmission methods

Answer : LAN Media Access methods

CISSP - Security Operations Mock Questions

Which of the following was designed to support multiple network types over the same serial link?


Options are :

  • Etherne
  • PPTP
  • PPP (Correct)
  • SLIP

Answer : PPP

Network-based Intrusion Detection systems


Options are :

  • commonly reside on a host and monitor the traffic on that specific host.
  • .commonly will not reside on a discrete network segment and monitor the traffic on that network segment.
  • commonly reside on a discrete network segment and does not monitor the traffic on that network segment.
  • commonly reside on a discrete network segment and monitor the traffic on that network segment. (Correct)

Answer : commonly reside on a discrete network segment and monitor the traffic on that network segment.

A DMZ is also known as a:


Options are :

  • place to attract hackers.
  • three legged firewall.
  • screened subnet. (Correct)
  • bastion host

Answer : screened subnet.

Which of the following is the primary security feature of a proxy server?


Options are :

  • URL blocking
  • Virus Detection
  • Content filtering (Correct)
  • Route blocking

Answer : Content filtering

CISSP-ISSAP Information Systems Security Architecture Exam Set 4

Frame relay uses a public switched network to provide:


Options are :

  • Local Area Network (LAN) connectivity.
  • Metropolitan Area Network (MAN) connectivity.
  • World Area Network (WAN) connectivity
  • Wide Area Network (WAN) connectivity (Correct)

Answer : Wide Area Network (WAN) connectivity

Which of the following was developed as a simple mechanism for allowing simple network terminals to load their operating system from a server over the LAN?


Options are :

  • ARP
  • DNS
  • BootP (Correct)
  • DHCP

Answer : BootP

Which of the following NAT firewall translation modes offers no protection from hacking attacks to an internal host using this functionality?


Options are :

  • Network redundancy translation
  • Load balancing translation
  • Dynamic translation
  • Static translation (Correct)

Answer : Static translation

The older coaxial cable has been widely replaced with twisted pair, which is extremely easy to work with, inexpensive, and also resistant to multiple host failure at once, especially when used in one of the following topology:


Options are :

  • Token Passing Configuration.
  • Star Configuration. (Correct)
  • Point to Point Configuration.
  • Ring Configuration.

Answer : Star Configuration.

A packet filtering firewall looks at the data packet to get information about the source and destination addresses of an incoming packet, the protocol (TCP, UDP, or ICMP), and the source and destination port for the:


Options are :

  • distributed service.
  • delayed service.
  • desired service. (Correct)
  • dedicated service

Answer : desired service.

A demilitarized zone is:


Options are :

  • a firewall
  • a part of a network perfectly safe from hackers
  • the network segment between the Internet and a private network (Correct)
  • a militarized network segment

Answer : the network segment between the Internet and a private network

CISSP - Mock Questions with all domains

Which of the following is an advantage of proxies?


Options are :

  • Proxies must exist for each service.
  • Proxies create a single point of failure.
  • Proxies provide a single point of access, control, and logging. (Correct)
  • Proxies do not protect the base operating system

Answer : Proxies provide a single point of access, control, and logging.

Proxies work by transferring a copy of each accepted data packet from one network to another, thereby masking the:


Options are :

  • data's details.
  • data's owner.
  • data's origin. (Correct)
  • data's payload.

Answer : data's origin.

Which of the following is an extension to Network Address Translation that permits multiple devices providing services on a local area network (LAN) to be mapped to a single public IP address?


Options are :

  • IP Distribution
  • Port address translation (Correct)
  • IP Spoofing
  • IP subnetting

Answer : Port address translation

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions