CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

98 Chapter 4 ■ Communication and Network Security (Domain 4)



  1. What type of firewall design does the following image show?


Firewall

DMZ

Private Network

Router

Internet

A. A single-tier firewall
B. A two-tier firewall
C. A three-tier firewall
D. A fully protected DMZ firewall


  1. What challenge is most common for endpoint security system deployments?
    A. Compromises
    B. The volume of data
    C. Monitoring encrypted traffic on the network
    D. Handling non-TCP protocols

  2. What type of address is 127.0.0.1?
    A. A public IP address
    B. An RFC 1918 address
    C. An APIPA address
    D. A loopback address

  3. Susan is writing a best practices statement for her organizational users who need to use
    Bluetooth. She knows that there are many potential security issues with Bluetooth and
    wants to provide the best advice she can. Which of the following sets of guidance should
    Susan include?
    A. Use Bluetooth’s built-in strong encryption, change the default PIN on your device,
    turn off discovery mode, and turn off Bluetooth when it’s not in active use.
    B. Use Bluetooth only for those activities that are not confidential, change the default
    PIN on your device, turn off discovery mode, and turn off Bluetooth when it’s not in
    active use.
    C. Use Bluetooth’s built-in strong encryption, use extended (8 digit or longer) Bluetooth
    PINs, turn off discovery mode, and turn off Bluetooth when it’s not in active use.
    D. Use Bluetooth only for those activities that are not confidential, use extended (8 digit
    or longer) Bluetooth PINs, turn off discovery mode, and turn off Bluetooth when it’s
    not in active use.

Free download pdf