CISSP Official Practice Tests by Mike Chapple, David Seidl
Chapter 1 ■ Security and Risk Management (Domain 1) 23 Ryan is a security risk analyst for an insurance company. He is currentl ...
Chapter 4: Communication and Network Security (Domain 4) 349 B. The Remote Access Dial In User Service (RADIUS) protocol was or ...
24 Chapter 1 ■ Security and Risk Management (Domain 1) John is analyzing an attack against his company in which the attacker fo ...
350 Appendix ■ Answers 2 1. A. S/MIME supports both signed messages and a secure envelope method. While the functionality of S/M ...
Chapter 1 ■ Security and Risk Management (Domain 1) 25 After completing the first year of his security awareness program, Charl ...
Chapter 4: Communication and Network Security (Domain 4) 351 B. If a business need requires messaging, using a local messaging ...
26 Chapter 1 ■ Security and Risk Management (Domain 1) Which of the following is not typically part of a termination process? A ...
Asset Security (Domain 2) Chapter 2 ...
352 Appendix ■ Answers 41. D. Ping uses ICMP, the Internet Control Message Protocol, to determine whether a system responds and ...
28 Chapter 2 ■ Asset Security (Domain 2) Angela is an information security architect at a bank and has been assigned to ensure ...
Chapter 4: Communication and Network Security (Domain 4) 353 A. WPA2, the replacement for WPA, does not suffer from the securit ...
Chapter 2 ■ Asset Security (Domain 2) 29 Staff in an information technology (IT) department who are delegated responsibility fo ...
354 Appendix ■ Answers 6 2. B. All stateful inspection firewalls enforce an implicit deny rule as the final rule of the rulebase ...
30 Chapter 2 ■ Asset Security (Domain 2) What term describes data that remains after attempts have been made to remove the data ...
Chapter 4: Communication and Network Security (Domain 4) 355 C. ICMP, RIP, and network address translation all occur at layer 3 ...
Chapter 2 ■ Asset Security (Domain 2) 31 C. Expensive media is easier to encrypt. D. More expensive media typically improves dat ...
356 Appendix ■ Answers 8 1. D. The IP address 127.0.0.1 is a loopback address and will resolve to the local machine. Public addr ...
32 Chapter 2 ■ Asset Security (Domain 2) Adjusting the CIS benchmarks to your organization’s mission and your specific IT syste ...
Chapter 4: Communication and Network Security (Domain 4) 357 because they may have to be passed without any inspection. Christma ...
Chapter 2 ■ Asset Security (Domain 2) 33 C. Decryption D. Loss of data integrity Full disk encryption like Microsoft’s BitLocke ...
«
17
18
19
20
21
22
23
24
25
26
»
Free download pdf