CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 4 ■ Communication and Network Security (Domain 4) 89



  1. In her role as an information security professional, Susan has been asked to identify areas
    where her organization’s wireless network may be accessible even though it isn’t intended
    to be. What should Susan do to determine where her organization’s wireless network is
    accessible?
    A. A site survey
    B. Warwalking
    C. Wardriving
    D. A design map

  2. The DARPA TCP/IP model’s Application layer matches up to what three OSI model layers?


A. Application, Presentation, and Transport.
B. Presentation, Session, and Transport.
C. Application, Presentation, and Session.
D. There is not a direct match. The TCP model was created before the OSI model.


  1. One of Susan’s attacks during a penetration test involves inserting false ARP data into a
    system’s ARP cache. When the system attempts to send traffic to the address it believes
    belongs to a legitimate system, it will instead send that traffic to a system she controls.
    What is this attack called?
    A. RARP flooding
    B. ARP cache poisoning
    C. A denial of ARP attack
    D. ARP buffer blasting

  2. Sue modifies her MAC address to one that is allowed on a network that uses MAC filter-
    ing to provide security. What is the technique Sue used, and what nonsecurity issue could
    her actions cause?
    A. Broadcast domain exploit, address conflict
    B. Spoofing, token loss
    C. Spoofing, address conflict
    D. Sham EUI creation, token loss

  3. Jim’s audit of a large organization’s traditional PBX showed that Direct Inward System
    Access (DISA) was being abused by third parties. What issue is most likely to lead to this
    problem?
    A. The PBX was not fully patched.
    B. The dial-in modem lines use unpublished numbers.
    C. DISA is set up to only allow local calls.
    D. One or more users’ access codes have been compromised.

Free download pdf