CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 10 ■ Practice Test 2 247



  1. Ed’s organization has 5 IP addresses allocated to them by their ISP but needs to connect
    over 100 computers and network devices to the Internet. What technology can he use to
    connect his entire network via the limited set of IP addresses he can use?
    A. IPsec
    B. PAT
    C. SDN
    D. IPX

  2. What type of attack would the following precautions help prevent?


■ (^) Requesting proof of identity
■ (^) Requiring callback authorizations on voice-only requests
■ (^) Not changing passwords via voice communications
A. DoS attacks
B. Worms
C. Social engineering
D. Shoulder surfing



  1. Fred’s organization needs to use a non-IP protocol on their VPN. Which of the common
    VPN protocols should he select to natively handle non-IP protocols?
    A. PPTP
    B. L2F
    C. L2TP
    D. IPsec

  2. Residual data is another term for what type of data left after attempts have been made to
    erase it?
    A. Leftover data
    B. MBR
    C. Bitrot
    D. Remnant data

  3. Which one of the following disaster recovery test types involves the actual activation of the
    disaster recovery facility?
    A. Simulation test
    B. Tabletop exercise
    C. Parallel test
    D. Checklist review

Free download pdf