CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 4 ■ Communication and Network Security (Domain 4) 101



  1. What topology correctly describes Ethernet?


A. A ring
B. A star
C. A mesh
D. A bus


  1. What type of attack is most likely to occur after a successful ARP spoofing attempt?


A. A DoS attack
B. A Trojan
C. A replay attack
D. A man-in-the-middle attack


  1. What speed is Category 3 UTP cable rated for?


A. 5 Mbps
B. 1 0 Mbps
C. 1 00 Mbps
D. 1 000 Mbps


  1. What issue occurs when data transmitted over one set of wires is picked up by another set
    of wires?
    A. Magnetic interference
    B. Crosstalk
    C. Transmission absorption
    D. Amplitude modulation

  2. What two key issues with the implementation of RC4 make Wired Equivalent Privacy
    (WEP) even weaker than it might otherwise be?
    A. Its use of a static common key and client-set encryption algorithms
    B. Its use of a static common key and a limited number of initialization vectors
    C. Its use of weak asymmetric keys and a limited number of initialization vectors
    D. Its use of a weak asymmetric key and client-set encryption algorithms

  3. Chris is setting up a hotel network and needs to ensure that systems in each room or suite
    can connect to each other, but systems in other suites or rooms cannot. At the same time,
    he needs to ensure that all systems in the hotel can reach the internet. What solution
    should he recommend as the most effective business solution?
    A. Per-room VPNs
    B. VLANs
    C. Port security
    D. Firewalls

Free download pdf