CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 4 ■ Communication and Network Security (Domain 4) 95



  1. The system at 15.246.10.1 attempts HTTP and HTTPS connections to the web server run-
    ning at 10.1.0.50. Which one of the following statements is true about that connection?
    A. Both connections will be allowed.
    B. Both connections will be blocked.
    C. The HTTP connection will be allowed, and the HTTPS connection will be blocked.
    D. The HTTP connection will be blocked, and the HTTPS connection will be allowed.

  2. What value should be used to fill in the source port for rule #3?


A. 25
B. 465
C. 80
D. Any


  1. Data streams occur at what three layers of the OSI model?


A. Application, Presentation, and Session
B. Presentation, Session, and Transport
C. Physical, Data Link, and Network
D. Data Link, Network, and Transport

6 7. Chris needs to design a firewall architecture that can support a DMZ, a database, and a
private internal network in a secure manner that separates each function. What type of
design should he use, and how many firewalls does he need?
A. A four-tier firewall design with two firewalls
B. A two-tier firewall design with three firewalls
C. A three-tier firewall design with at least one firewall
D. A single-tier firewall design with three firewalls



  1. Lauren’s networking team has been asked to identify a technology that will allow them to
    dynamically change the organization’s network by treating the network like code. What
    type of architecture should she recommend?
    A. A network that follows the 5-4-3 rule
    B. A converged network
    C. A software-defined network
    D. A hypervisor-based network

  2. Cable modems, ISDN, and DSL are all examples of what type of technology?


A. Baseband
B. Broadband
C. Digital
D. Broadcast
Free download pdf