CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 4 ■ Communication and Network Security (Domain 4) 85


C. ARP spoofing
D. A Cain attack


  1. A remote access tool that copies what is displayed on a desktop PC to a remote computer is
    an example of what type of technology?
    A. Remote node operation
    B. Screen scraping
    C. Remote control
    D. RDP

  2. Which email security solution provides two major usage modes: (1) signed messages that
    provide integrity, sender authentication, and nonrepudiation; and (2) an enveloped mes-
    sage mode that provides integrity, sender authentication, and confidentiality?
    A. S/MIME
    B. MOSS
    C. PEM
    D. DKIM

  3. During a security assessment, Jim discovers that the organization he is working with uses
    a multilayer protocol to handle SCADA systems and recently connected the SCADA net-
    work to the rest of the organization’s production network. What concern should he raise
    about serial data transfers carried via TCP/IP?
    A. SCADA devices that are now connected to the network can now be attacked over the
    network.
    B. Serial data over TCP/IP cannot be encrypted.
    C. Serial data cannot be carried in TCP packets.
    D. TCP/IP’s throughput can allow for easy denial of service attacks against serial
    devices.

  4. What type of key does WEP use to encrypt wireless communications?


A. An asymmetric key
B. Unique key sets for each host
C. A predefined shared static key
D. Unique asymmetric keys for each host
Free download pdf