CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

94 Chapter 4 ■ Communication and Network Security (Domain 4)



  1. What common security issue is often overlooked with cordless phones?
    A. Their signal is rarely encrypted and thus can be easily monitored.
    B. They use unlicensed frequencies.
    C. They can allow attackers access to wireless networks.
    D. They are rarely patched and are vulnerable to malware.

  2. Lauren’s organization has deployed VoIP phones on the same switches that the desktop
    PCs are on. What security issue could this create, and what solution would help?
    A. VLAN hopping; use physically separate switches.
    B. VLAN hopping; use encryption.
    C. Caller ID spoofing; MAC filtering.
    D. Denial of service attacks; use a firewall between networks.


For questions 62–65, please refer to a stateful inspection firewall running the rulebase
shown here. The source ports have been omitted from the figure, but you may assume that
they are specified correctly for the purposes of answering questions 62–64.


  1. Which one of the following rules is not shown in the rulebase but will be enforced by the
    firewall?
    A. Stealth
    B. Implicit deny
    C. Connection proxy
    D. Egress filter

  2. What type of server is running at IP address 10.1.0.26?
    A. Email
    B. Web
    C. FTP
    D. Database

Free download pdf