CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

100 Chapter 4 ■ Communication and Network Security (Domain 4)



  1. Phillip maintains a modem bank in support of several legacy services used by his organiza-
    tion. Which one of the following protocols is most appropriate for this purpose?
    A. SLIP
    B. SLAP
    C. PPTP
    D. PPP

  2. One of the findings that Jim made when performing a security audit was the use of non-IP
    protocols in a private network. What issue should Jim point out that may result from the
    use of these non-IP protocols?
    A. They are outdated and cannot be used on modern PCs.
    B. They may not be able to be filtered by firewall devices.
    C. They may allow Christmas tree attacks.
    D. IPX extends on the IP protocol and may not be supported by all TCP stacks.

  3. Angela needs to choose between EAP, PEAP, and LEAP for secure authentication. Which
    authentication protocol should she choose and why?
    A. EAP, because it provides strong encryption by default
    B. LEAP, because it provides frequent reauthentication and changing of WEP keys
    C. PEAP, because it provides encryption and doesn’t suffer from the same vulnerabilities
    that LEAP does
    D. None of these options can provide secure authentication, and an alternate solution
    should be chosen.

  4. Lauren has been asked to replace her organization’s PPTP implementation with an L2TP
    implementation for security reasons. What is the primary security reason that L2TP would
    replace PPTP?
    A. L2TP can use IPsec.
    B. L2TP creates a point-to-point tunnel, avoiding multipoint issues.
    C. PPTP doesn’t support EAP.
    D. PPTP doesn’t properly encapsulate PPP packets.

  5. Jim is building a research computing system that benefits from being part of a full mesh
    topology between systems. In a five-node full mesh topology design, how many connec-
    tions will an individual node have?
    A. Two
    B. Three
    C. Four
    D. Five

Free download pdf