CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

102 Chapter 4 ■ Communication and Network Security (Domain 4)



  1. During a forensic investigation, Charles is able to determine the Media Access Control
    address of a system that was connected to a compromised network. Charles knows that
    MAC addresses are tied back to a manufacturer or vendor and are part of the fingerprint
    of the system. To which OSI layer does a MAC address belong?
    A. The Application layer
    B. The Session layer
    C. The Physical layer
    D. The Data Link layer

  2. Ben knows that his organization wants to be able to validate the identity of other organi-
    zations based on their domain name when receiving and sending email. What tool should
    Ben recommend?
    A. PEM
    B. S/MIME
    C. DKIM
    D. MOSS

Free download pdf