CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

90 Chapter 4 ■ Communication and Network Security (Domain 4)



  1. SMTP, HTTP, and SNMP all occur at what layer of the OSI model?
    A. Layer 4
    B. Layer 5
    C. Layer 6
    D. Layer 7

  2. Lauren uses the ping utility to check whether a remote system is up as part of a penetration
    testing exercise. If she does not want to see her own ping packets, what protocol should
    she filter out from her packet sniffer’s logs?
    A. UDP
    B. TCP
    C. IP
    D. ICMP

  3. Lauren wants to provide port-based authentication on her network to ensure that clients
    must authenticate before using the network. What technology is an appropriate solution
    for this requirement?
    A. 802.11a
    B. 802.3
    C. 802.15.1
    D. 802.1x

  4. Ben has deployed a 1000BaseT 1 gigabit network and needs to run a cable to another
    building. If Ben is running his link directly from a switch to another switch in that
    building, what is the maximum distance Ben can cover according to the 1000BaseT
    specification?
    A. 2 kilometers
    B. 5 00 meters
    C. 1 85 meters
    D. 1 00 meters

  5. Jim is building the network for a remote site that only has ISDN as an option for connec-
    tivity. What type of ISDN should he look for to get the maximum speed possible?
    A. BRI
    B. BPRI
    C. PRI
    D. D channel

  6. SPIT attacks target what technology?
    A. Virtualization platforms
    B. Web services

Free download pdf