CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 10 ■ Practice Test 2 253



  1. Sally’s organization needs to be able to prove that certain staff members sent emails, and
    she wants to adopt a technology that will provide that capability without changing their
    existing email system. What is the technical term for the capability Sally needs to imple-
    ment as the owner of the email system, and what tool could she use to do it?
    A. Integrity; IMAP
    B. Repudiation; encryption
    C. Nonrepudiation; digital signatures
    D. Authentication; DKIM

  2. Which one of the following background checks is not normally performed during normal
    pre-hire activities?
    A. Credit check
    B. Reference verification
    C. Criminal records check
    D. Medical records check

  3. Margot is investigating suspicious activity on her network and uses a protocol analyzer
    to sniff inbound and outbound traffic. She notices an unusual packet that has identical
    source and destination IP addresses. What type of attack uses this packet type?
    A. Fraggle
    B. Smurf
    C. Land
    D. Teardrop

  4. Jim is performing a security assessment of his company and would like to use appropriate
    testing tools. Match each of the numbered tools with the best lettered description of the
    tool’s purpose. You should use each item exactly once.


Tool s


  1. Nmap

  2. QualysGuard

  3. Metasploit

  4. Nikto

  5. aircrack-ng


Purpose
A. Network vulnerability scanning
B. Port scanning
C. Wireless encryption assessment
D. Web vulnerability scanning
E. Exploitation framework
Free download pdf