CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

256 Chapter 10 ■ Practice Test 2



  1. Referring to the figure shown here, what is the name of the security control indicated by
    the arrow?


A. Mantrap
B. Intrusion prevention system
C. Turnstile
D. Portal


  1. What two important factors does accountability for access control rely on?
    A. Identification and authorization
    B. Authentication and authorization
    C. Identification and authentication
    D. Accountability and authentication

  2. What key assumption made by EAP can be remedied by using PEAP?
    A. EAP assumes that LEAP will replace TKIP, ensuring that authentication will occur.
    B. EAP originally assumed the use of physically isolated channels and is usually not
    encrypted.
    C. There are no TLS implementations available using EAP.
    D. EAP does not allow additional authentication methods, and PEAP adds additional
    methods.

  3. Scott’s organization has configured their external IP address to be 192.168.1.25. When
    traffic is sent to their ISP, it never reaches its destination. What problem is Scott’s organi-
    zation encountering?
    A. BGP is not set up properly.
    B. They have not registered their IP with their ISP.

Free download pdf