CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 10 ■ Practice Test 2 249



  1. What is the minimum number of cryptographic keys necessary to achieve strong security
    when using the 3DES algorithm?
    A. 1
    B. 2
    C. 3
    D. 4

  2. Match each of the numbered IP addresses with the best lettered description of that IP
    address. Each IP address in the numbered list should have one answer from the descrip-
    tions. Each description may be used once, more than once, or not at all.


IP address


  1. 10.14.124.240

  2. 127.0.0.1

  3. 129.74.250.10 0

  4. 169.254.103.17

  5. 192.168.15.10

  6. 216.15.1.10


Description
A. Public IP address
B. Private IP address
C. APIPA address
D. Loopback address


  1. Lauren wants to monitor her LDAP servers to identify what types of queries are causing
    problems. What type of monitoring should she use if she wants to be able to use the pro-
    duction servers and actual traffic for her testing?
    A. Active
    B. Real-time
    C. Passive
    D. Replay

  2. Steve is developing an input validation routine that will protect the database supporting a
    web application from SQL injection attack. Where should Steve place the input validation
    code?
    A. JavaScript embedded in the web pages
    B. Backend code on the web server
    C. Stored procedure on the database
    D. Code on the user’s web browser

Free download pdf