CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

254 Chapter 10 ■ Practice Test 2



  1. In the OSI model, when a packet changes from a datastream to a segment or a datagram,
    what layer has it traversed?
    A. The Transport layer
    B. The Application layer
    C. The Data Link layer
    D. The Physical layer

  2. Tommy handles access control requests for his organization. A user approaches him and
    explains that he needs access to the human resources database in order to complete a
    headcount analysis requested by the CFO. What has the user demonstrated successfully to
    Tom my?
    A. Clearance
    B. Separation of duties
    C. Need to know
    D. Isolation


112. Kathleen wants to set up a service to provide information about her organization’s users
and services using a central, open, vendor-neutral, standards-based system that can be eas-
ily queried. Which of the following technologies is her best choice?
A. RADIUS
B. LDAP
C. Kerberos
D. Active Directory


  1. What type of firewall is capable of inspecting traffic at layer 7 and performing protocol-
    specific analysis for malicious traffic?
    A. Application firewall
    B. Stateful inspection firewall
    C. Packet filtering firewall
    D. Bastion host

  2. Alice would like to add another object to a security model and grant herself rights to that
    object. Which one of the rules in the Take-Grant protection model would allow her to
    complete this operation?
    A. Take rule
    B. Grant rule
    C. Create rule
    D. Remove rule

Free download pdf