CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 4 ■ Communication and Network Security (Domain 4) 91


C. VoIP systems
D. Secure Process Internal Transfers


  1. What does a bluesnarfing attack target?


A. Data on IBM systems
B. An outbound phone call via Bluetooth
C. 8 02.11b networks
D. Data from a Bluetooth-enabled device


  1. Which of the following options includes standards or protocols that exist in layer 6 of the
    OSI model?
    A. NFS, SQL, and RPC
    B. TCP, UDP, and TLS
    C. JPEG, ASCII, and MIDI
    D. HTTP, FTP, and SMTP

  2. What network topology is shown here?


A. A ring
B. A bus
C. A star
D. A mesh
Free download pdf