CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

92 Chapter 4 ■ Communication and Network Security (Domain 4)



  1. There are four common VPN protocols. Which group listed contains all of the common
    VPN protocols?
    A. PP T P, LT P, L 2T P, I Psec
    B. PPP, L2TP, IPsec, VNC
    C. PPTP, L2F, L2TP, IPsec
    D. PPTP, L2TP, IPsec, SPAP

  2. What network technology is best described as a token-passing network that uses a pair of
    rings with traffic flowing in opposite directions?
    A. A ring topology
    B. Token Ring
    C. FDDI
    D. SONET

  3. Which OSI layer includes electrical specifications, protocols, and interface standards?
    A. The Transport layer
    B. The Device layer
    C. The Physical layer
    D. The Data Link layer

  4. Ben is designing a Wi-Fi network and has been asked to choose the most secure option for
    the network. Which wireless security standard should he choose?
    A. W PA 2
    B. W PA
    C. WEP
    D. AES

  5. If your organization needs to allow attachments in email to support critical business pro-
    cesses, what are the two best options for helping to avoid security problems caused by
    attachments?
    A. Train your users and use antimalware tools.
    B. Encrypt your email and use antimalware tools.
    C. Train your users and require S/MIME for all email.
    D. Use S/MIME by default and remove all ZIP (.zip) file attachments.

  6. Segmentation, sequencing, and error checking all occur at what layer of the OSI model
    that is associated with SSL, TLS, and UDP?
    A. The Transport layer
    B. The Network layer
    C. The Session layer
    D. The Presentation layer

Free download pdf