CISSP Official Practice Tests by Mike Chapple, David Seidl
406 Appendix ■ Answers 13. D. Clipping is an analysis technique that only reports alerts after they exceed a set threshold. It i ...
86 Chapter 4 ■ Communication and Network Security (Domain 4) Arnold is receiving reports from end users that their internet con ...
Chapter 9: Practice Test 1 407 A. Identity as a service (IDaaS) provides an identity platform as a third-party service. This ca ...
Chapter 4 ■ Communication and Network Security (Domain 4) 87 Lauren’s organization has used a popular messaging service for a nu ...
408 Appendix ■ Answers 3 3. A. Encrypting the files reduces the probability that the data will be successfully stolen, so it is ...
88 Chapter 4 ■ Communication and Network Security (Domain 4) Which of the following drawbacks is a concern when multilayer prot ...
Chapter 9: Practice Test 1 409 A. The modulo function is the remainder value left over after an integer division operation take ...
Chapter 4 ■ Communication and Network Security (Domain 4) 89 In her role as an information security professional, Susan has bee ...
410 Appendix ■ Answers 4 9. C. Steganography is the art of using cryptographic techniques to embed secret messages within other ...
90 Chapter 4 ■ Communication and Network Security (Domain 4) SMTP, HTTP, and SNMP all occur at what layer of the OSI model? A. ...
Chapter 9: Practice Test 1 411 B. Proactive monitoring, aka synthetic monitoring, uses recorded or generated traffic to test sy ...
Chapter 4 ■ Communication and Network Security (Domain 4) 91 C. VoIP systems D. Secure Process Internal Transfers What does a b ...
412 Appendix ■ Answers 6 8. C. Masquerading (or impersonation) attacks use stolen or falsified credentials to bypass authenticat ...
92 Chapter 4 ■ Communication and Network Security (Domain 4) There are four common VPN protocols. Which group listed contains a ...
Chapter 9: Practice Test 1 413 7 7. B. Class B fire extinguishers use carbon dioxide, halon, or soda acid as their suppression m ...
Chapter 4 ■ Communication and Network Security (Domain 4) 93 The Windows ipconfig command displays the following information: ...
414 Appendix ■ Answers 8 7. B. During the preservation phase, the organization ensures that information related to the matter at ...
94 Chapter 4 ■ Communication and Network Security (Domain 4) What common security issue is often overlooked with cordless phone ...
Chapter 9: Practice Test 1 415 D. Smurf attacks use a distributed attack approach to send ICMP echo replies at a targeted syste ...
Chapter 4 ■ Communication and Network Security (Domain 4) 95 The system at 15.246.10.1 attempts HTTP and HTTPS connections to t ...
«
23
24
25
26
27
28
29
30
31
32
»
Free download pdf