CISSP Communication and Network Security Practice Exam Set 7

Packet Filtering Firewalls can also enable access for:


Options are :

  • only unauthorized application port or service numbers
  • only authorized application port or service integers.
  • only authorized application port or ex-service numbers.
  • only authorized application port or service numbers (Correct)

Answer : only authorized application port or service numbers

Which service usually runs on port 25?


Options are :

  • Simple Mail Transfer Protocol (SMTP) (Correct)
  • Telnet
  • File Transfer Protocol (FTP)
  • Domain Name Service (DNS)

Answer : Simple Mail Transfer Protocol (SMTP)

CISSP Security and Risk Management Certified Practice Exam Set 4

Which of the following security-focused protocols has confidentiality services operating at a layer different from the others?


Options are :

  • Secure socket layer (SSL)
  • Secure HTTP (S-HTTP) (Correct)
  • FTP Secure (FTPS)
  • Sequenced Packet Exchange (SPX)

Answer : Secure HTTP (S-HTTP)

Which layer defines how packets are routed between end systems?


Options are :

  • Data link layer
  • Transport layer
  • Network layer (Correct)
  • Session layer

Answer : Network layer

Which OSI/OSI layer defines the X.24, V.35, X.21 and HSSI standard interfaces?


Options are :

  • Physical layer (Correct)
  • Data link layer
  • Transport layer
  • Network layer

Answer : Physical layer

The International Organization for Standardization / Open Systems Interconnection (ISO/OSI) Layer 7 does NOT include which of the following?


Options are :

  • TCP (Transmission Control Protocol) (Correct)
  • HTTP (Hypertext Transfer Protocol)
  • The International Organization for Standardization / Open Systems Interconnection (ISO/OSI) Layer 7 does NOT include which of the following?
  • SNMP (Simple Network Management Protocol

Answer : TCP (Transmission Control Protocol)

An area of the Telecommunications and Network Security domain that directly affects the Information Systems Security tenet of Availability can be defined as:


Options are :

  • Network accountability
  • Network acceptability
  • Netware availability
  • Network availability (Correct)

Answer : Network availability

Which OSI/ISO layer is the Media Access Control (MAC) sublayer part of?


Options are :

  • Network layer
  • Physical layer
  • Transport layer
  • Data link layer (Correct)

Answer : Data link layer

CISSP - Software Development Security Mock Questions

Transport Layer Security (TLS) is a two-layered socket layer security protocol that contains the TLS Record Protocol and the:


Options are :

  • Transport Layer Security (TLS) Handshake Protocol. (Correct)
  • Transport Layer Security (TLS) Data Protocol.
  • Transport Layer Security (TLS) Link Protocol.
  • Transport Layer Security (TLS) Internet Protocol.

Answer : Transport Layer Security (TLS) Handshake Protocol.

Which layer of the TCP/IP protocol model would BEST correspond to the OSI/ISO model's network layer?


Options are :

  • Host-to-host transport layer
  • Network access layer
  • Internet layer (Correct)
  • Application layer

Answer : Internet layer

Which of the following is NOT a VPN communications protocol standard?


Options are :

  • IP Security
  • Layer 2 tunneling protocol (L2TP)
  • Challenge Handshake Authentication Protocol (CHAP) (Correct)
  • Point-to-point tunneling protocol (PPTP)

Answer : Challenge Handshake Authentication Protocol (CHAP)

Which of the following is TRUE related to network sniffing?


Options are :

  • Sniffers alter the source address of a computer to disguise and exploit weak authentication methods.
  • Sniffers allow an attacker to monitor data passing across a network. (Correct)
  • Sniffers take over network connections.
  • Sniffers send IP fragments to a system that overlap with each other

Answer : Sniffers allow an attacker to monitor data passing across a network.

Communications and network security relates to transmission of which of the following?


Options are :

  • data and multimedia
  • voice
  • voice and multimedia
  • voice, data and multimedia (Correct)

Answer : voice, data and multimedia

How many layers are defined within the US Department of Defense (DoD) TCP/IP Model?


Options are :

  • 4 (Correct)
  • 3
  • 5
  • 7

Answer : 4

CISSP (Information Systems Security) Practice Tests 2019 Set 6

Secure Sockets Layer (SSL) is very heavily used for protecting which of the following?


Options are :

  • Electronic Payment transactions.
  • Telnet transactions.
  • Web transactions. (Correct)
  • EDI transactions.

Answer : Web transactions.

What is the maximum length of cable that can be used for a twisted-pair, Category 5 10Base-T cable?


Options are :

  • 185 meters
  • 80 meters
  • 500 meters
  • 100 meters (Correct)

Answer : 100 meters

Which type of attack involves hijacking a session between a host and a target by predicting the target's choice of an initial TCP sequence number?


Options are :

  • SYN flood attack
  • IP spoofing attack
  • TCP sequence number attack (Correct)
  • Smurf attack

Answer : TCP sequence number attack

One of the following statements about the differences between PPTP and L2TP is NOT true


Options are :

  • .PPTP is an encryption protocol and L2TP is not
  • L2TP supports AAA servers
  • PPTP can run only on top of IP networks.
  • L2TP works well with all firewalls and network devices that perform NAT. (Correct)

Answer : L2TP works well with all firewalls and network devices that perform NAT.

Which of the following media is MOST resistant to EMI interference?


Options are :

  • twisted pair
  • fiber optic (Correct)
  • coaxial cable
  • microwave

Answer : fiber optic

Which port does the Post Office Protocol Version 3 (POP3) make use of?


Options are :

  • 139
  • 119
  • 109
  • 110 (Correct)

Answer : 110

CISSP - Software Development Security Mock Questions

How many bits compose an IPv6 address?


Options are :

  • 128 bits (Correct)
  • 32 bits
  • 32 bits
  • 96 bits

Answer : 128 bits

Which layer of the TCP/IP protocol model defines the IP datagram and handles the routing of data across networks?


Options are :

  • Host-to-host transport layer
  • Application layer
  • Network access layer
  • Internet layer (Correct)

Answer : Internet layer

Similar to Secure Shell (SSH-2), Secure Sockets Layer (SSL) uses symmetric encryption for encrypting the bulk of the data being sent over the session and it uses asymmetric or public key cryptography for:


Options are :

  • Peer Authentication (Correct)
  • Name Resolution
  • Server Authentication
  • Peer Identification

Answer : Peer Authentication

Which of the following is immune to the effects of electromagnetic interference (EMI) and therefore has a much longer effective usable length?


Options are :

  • wisted Pair cable
  • Axial cable
  • Coaxial cable
  • Fiber Optic cable (Correct)

Answer : Fiber Optic cable

Which OSI/ISO layer defines how to address the physical devices on the network?


Options are :

  • Data Link layer (Correct)
  • Session layer
  • Application layer
  • Transport layer

Answer : Data Link layer

Transport Layer Security (TLS) is a two-layered socket layer security protocol that contains the TLS Record Protocol and the:


Options are :

  • Transport Layer Security (TLS) Handshake Protocol. (Correct)
  • Transport Layer Security (TLS) Internet Protocol.
  • Transport Layer Security (TLS) Link Protocol.
  • Transport Layer Security (TLS) Data Protocol

Answer : Transport Layer Security (TLS) Handshake Protocol.

CISSP Security and Risk Management Certified Practice Exam Set 2

Which of the following are well known ports assigned by the IANA?


Options are :

  • Ports 0 to 127
  • Ports 0 to 255
  • Ports 0 to 1024
  • Ports 0 to 1023 (Correct)

Answer : Ports 0 to 1023

This OSI layer has a service that negotiates transfer syntax and translates data to and from the transfer syntax for users, which may represent data using different syntaxes. At which of the following layers would you find such service?


Options are :

  • Transport
  • Presentation (Correct)
  • Session
  • Application

Answer : Presentation

Behavioral-based systems are also known as?


Options are :

  • Misuse detective systems
  • Profile-based systems (Correct)
  • Pattern matching systems
  • Rule-based IDS

Answer : Profile-based systems

Tim is a network administrator of Acme Inc. He is responsible for configuring the network devices. John the new security manager reviews the configuration of the Firewall configured by Tim and identifies an issue.This specific firewall is configured in failover mode with another firewall. A sniffer on a PC connected to the same switch as the firewalls can decipher the credentials, used by Tim while configuring the firewalls.Which of the following should be used by Tim to ensure that no one can eavesdrop on the communication?


Options are :

  • SFTP
  • RSH
  • SSH (Correct)
  • SCP

Answer : SSH

In telephony different types of connections are being used. The connection from the phone company's


Options are :

  • new loop
  • loopback
  • indigenous loop
  • local loop (Correct)

Answer : local loop

The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers 6 is which of the following?


Options are :

  • Data Link Layer
  • Presentation Layer (Correct)
  • Application Layer
  • Network Layer

Answer : Presentation Layer

CISSP - Security Operations Mock Questions

Which layer of the DoD TCP/IP model controls the communication flow between hosts?


Options are :

  • Network access layer
  • Internet layer
  • Application layer
  • Host-to-host transport layer (Correct)

Answer : Host-to-host transport layer

At which of the OSI/ISO model layer is IP implemented?


Options are :

  • Transport layer
  • Session layer
  • Network layer (Correct)
  • Data link layer

Answer : Network layer

What protocol is used on the Local Area Network (LAN) to obtain an IP address from its known MAC address?


Options are :

  • Network address translation (NAT)
  • Address resolution protocol (ARP)
  • Data link layer
  • Reverse address resolution protocol (RARP) (Correct)

Answer : Reverse address resolution protocol (RARP)

Secure Sockets Layer (SSL) is very heavily used for protecting which of the following?


Options are :

  • Web transactions. (Correct)
  • Telnet transactions.
  • Electronic Payment transactions.
  • EDI transactions

Answer : Web transactions.

Which of the following methods of providing telecommunications continuity involves the use of an alternative media?


Options are :

  • Last mile circuit protection
  • Alternative routing (Correct)
  • Diverse routing
  • Long haul network diversity

Answer : Alternative routing

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions