CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 12 ■ Practice Test 4 309



  1. Susan is setting up the network for a local coffee house and wants to ensure that users
    have to authenticate using an email address and agree to the coffee house’s acceptable use
    policy before being allowed on the network. What technology should she use to do this?
    A. 802.11
    B. NAC
    C. A captive portal
    D. A wireless gateway

  2. What is another term for active monitoring?


A. Synthetic
B. Passive
C. Reactive
D. Span-based


  1. The TCP header is made up of elements such as the source port, destination port, sequence
    number, and others. How many bytes long is the TCP header?
    A. 8 bytes
    B. 2 0–60 bytes
    C. 6 4 bytes
    D. 6 4–128 bytes


For questions 104–106, please refer to the following scenario:

The company that Fred works for is reviewing the security of their company-issued cell
phones. They issue 4G-capable smartphones running Android and iOS and use a mobile
device management solution to deploy company software to the phones. The mobile device
management software also allows the company to remotely wipe the phones if they are
lost.


  1. What security considerations should Fred’s company require for sending sensitive data
    over the cellular network?
    A. They should use the same requirements as data over any public network.
    B. Cellular provider networks are private networks and should not require special
    consideration.
    C. Encrypt all traffic to ensure confidentiality.
    D. Require the use of WAP for all data sent from the phone.

  2. Fred intends to attend a major hacker conference this year. What should he do when con-
    necting to his cellular provider’s 4G network while at the conference?
    A. Continue normal usage.
    B. Discontinue all usage; towers can be spoofed.
    C. Only use trusted Wi-Fi networks.
    D. Connect to his company’s encrypted VPN service.

Free download pdf