CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 6 ■ Security Assessment and Testing (Domain 6) 141



  1. Match each of the numbered scanning types with the appropriate lettered description
    shown. You should use each item exactly once.


Scanning types


  1. TCP Connect

  2. TCP ACK

  3. TCP SYN

  4. Xmas


Scanning descriptions

A. Sends a request to open a new connection
B. Completes a three-way handshake
C. Sends a packet disguised as part of an active control
D. Sends a packet with the FIN, PSH, and URG flags set

Kara used nmap to perform a scan of a system under her control and received the results
shown here. Refer to these results to answer questions 56 and 57.


  1. If Kara’s primary concern is preventing eavesdropping attacks, which port should she block?


A. 22
B. 80
C. 443
D. 1433


  1. If Kara’s primary concern is preventing administrative connections to the server, which
    port should she block?
    A. 22
    B. 80
    C. 443
    D. 1433

  2. During a third-party audit, Jim’s company receives a finding that states, “The administra-
    tor should review backup success and failure logs on a daily basis, and take action in a
    timely manner to resolve reported exceptions.” What is the biggest issue that is likely to
    result if Jim’s IT staff need to restore from a backup?
    A. They will not know if the backups succeeded or failed.
    B. The backups may not be properly logged.
    C. The backups may not be usable.
    D. The backup logs may not be properly reviewed.

Free download pdf