CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 4 ■ Communication and Network Security (Domain 4) 97



  1. The VM administrators recommend enabling cut and paste between virtual machines.
    What security concern should Ben raise about this practice?
    A. It can cause a denial of service condition.
    B. It can serve as a covert channel.
    C. It can allow viruses to spread.
    D. It can bypass authentication controls.

  2. Ben is concerned about exploits that allow VM escape. What option should Ben suggest to
    help limit the impact of VM escape exploits?
    A. Separate virtual machines onto separate physical hardware based on task or data
    types.
    B. Use VM escape detection tools on the underlying hypervisor.
    C. Restore machines to their original snapshots on a regular basis.
    D. Use a utility like Tripwire to look for changes in the virtual machines.

  3. WPA2’s Counter Mode Cipher Block Chaining Message Authentication Mode Protocol
    (CCMP) is based on which common encryption scheme?
    A. DES
    B. 3DES
    C. AES
    D. TLS


7 7. When a host on an Ethernet network detects a collision and transmits a jam signal, what
happens next?
A. The host that transmitted the jam signal is allowed to retransmit while all other hosts
pause until that transmission is received successfully.
B. All hosts stop transmitting, and each host waits a random period of time before
attempting to transmit again.
C. All hosts stop transmitting, and each host waits a period of time based on how
recently it successfully transmitted.
D. Hosts wait for the token to be passed and then resume transmitting data as they pass
the token.



  1. What is the speed of a T3 line?


A. 1 28 kbps
B. 1 .544 Mbps
C. 4 4.736 Mbps
D. 1 55 Mbps
Free download pdf