CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 9 ■ Practice Test 1 203



  1. What type of motion detector uses high microwave frequency signal transmissions to
    identify potential intruders?
    A. Infrared
    B. Heat-based
    C. Wave pattern
    D. Capacitance

  2. Susan sets up a firewall that keeps track of the status of the communication between two
    systems and allows a remote system to respond to a local system after the local system
    starts communication. What type of firewall is Susan using?
    A. A static packet filtering firewall
    B. An application-level gateway firewall
    C. A stateful packet inspection firewall
    D. A circuit-level gateway firewall


For questions 9–11, please refer to the following scenario:

Ben owns a coffeehouse and wants to provide wireless Internet service for his custom-
ers. Ben’s network is simple and uses a single consumer-grade wireless router and a cable
modem connected via a commercial cable data contract.


  1. How can Ben provide access control for his customers without having to provision user
    IDs before they connect while also gathering useful contact information for his business
    purposes?
    A. WPA 2 PSK
    B. A captive portal
    C. Require customers to use a publicly posted password like “BensCoffee.”
    D. Port security

  2. Ben intends to run an open (unencrypted) wireless network. How should he connect his
    business devices?
    A. Run WPA2 on the same SSID.
    B. Set up a separate SSID using WPA2.
    C. Run the open network in Enterprise mode.
    D. Set up a separate wireless network using WEP.

  3. After implementing the solution from the first question, Ben receives a complaint about
    users in his cafe hijacking other customers’ web traffic, including using their usernames
    and passwords. How is this possible?
    A. The password is shared by all users, making traffic vulnerable.
    B. A malicious user has installed a Trojan on the router.
    C. A user has ARP spoofed the router, making all traffic broadcast to all users.
    D. Open networks are unencrypted, making traffic easily sniffable.

Free download pdf