CISSP Official Practice Tests by Mike Chapple, David Seidl
96 Chapter 4 ■ Communication and Network Security (Domain 4) What type of firewall design is shown in the following image? Fir ...
Chapter 4 ■ Communication and Network Security (Domain 4) 97 The VM administrators recommend enabling cut and paste between vir ...
98 Chapter 4 ■ Communication and Network Security (Domain 4) What type of firewall design does the following image show? Firew ...
Chapter 4 ■ Communication and Network Security (Domain 4) 99 What type of networking device is most commonly used to assign end ...
100 Chapter 4 ■ Communication and Network Security (Domain 4) Phillip maintains a modem bank in support of several legacy servi ...
Chapter 4 ■ Communication and Network Security (Domain 4) 101 What topology correctly describes Ethernet? A. A ring B. A star ...
102 Chapter 4 ■ Communication and Network Security (Domain 4) During a forensic investigation, Charles is able to determine the ...
Identity and Access Management (Domain 5) Chapter 5 ...
104 Chapter 5 ■ dentity and Access Management (Domain 5)I Which of the following is best described as an access control model t ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 105 During a log review, Saria discovers a series of logs that show login ...
106 Chapter 5 ■ dentity and Access Management (Domain 5)I Kathleen needs to set up an Active Directory trust to allow authentic ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 107 What type of access controls allow the owner of a file to grant other ...
108 Chapter 5 ■ dentity and Access Management (Domain 5)I At point B in the diagram, what two important elements does the KDC s ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 109 Jim has worked in human relations, payroll, and customer service role ...
110 Chapter 5 ■ dentity and Access Management (Domain 5)I Which of the following is not part of a Kerberos authentication syste ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 111 A. RBAC B. DAC C. M AC D. TBAC Which of the following is not a valid ...
112 Chapter 5 ■ dentity and Access Management (Domain 5)I Susan is working to improve the strength of her organization’s passwo ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 113 Alex is concerned about eavesdropping on the SAML traffic and also wa ...
114 Chapter 5 ■ dentity and Access Management (Domain 5)I Which of the following tools is not typically used to verify that a p ...
Chapter 5 ■ dentity and Access Management (Domain 5)I 115 Jim configures his LDAP client to connect to an LDAP directory server ...
«
2
3
4
5
6
7
8
9
10
11
»
Free download pdf