CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

356 Appendix ■ Answers


8 1. D. The IP address 127.0.0.1 is a loopback address and will resolve to the local machine.
Public addresses are non-RFC 1918, non-reserved addresses. RFC 1918 addresses are
reserved and include ranges like 10.x.x.x. An APIPA address is a self-assigned address
used when a DHCP server cannot be found.


  1. B. Since Bluetooth doesn’t provide strong encryption, it should only be used for activities
    that are not confidential. Bluetooth PINs are four-digit codes that often default to 0000.
    Turning it off and ensuring that your devices are not in discovery mode can help prevent
    Bluetooth attacks.

  2. C. The assignment of endpoint systems to VLANs is normally performed by a network switch.

  3. B. Fibre Channel over Ethernet allows Fibre Channel communications over Ethernet
    networks, allowing existing high-speed networks to be used to carry storage traffic. This
    avoids the cost of a custom cable plant for a Fibre Channel implementation. MPLS, or
    Multiprotocol Label Switching, is used for high performance networking; VoIP is Voice
    over IP; and SDN is software-defined networking.

  4. D. A modem (MOdulator/DEModulator) modulates between an analog carrier like
    a phone line and digital communications like those used between computers. While
    modems aren’t in heavy use in most areas, they are still in place for system control and
    remote system contact and in areas where phone lines are available but other forms of
    communication are too expensive or not available.

  5. The OSI layers in order from layer 1 to layer 7 are:
    D. Physical
    B. Data Link
    C. Network
    G. Transport
    F. Session
    E. Presentation
    A. Application


8 7. B. A teardrop attack uses fragmented packets to target a flaw in how the TCP stack on
a system handles fragment reassembly. If the attack is successful, the TCP stack fails,
resulting in a denial of service. Christmas tree attacks set all of the possible TCP flags on
a packet, thus “lighting it up like a Christmas tree.” Stack killer and frag grenade attacks
are made-up answers.


  1. D. The Point-to-Point Protocol (PPP) is used for dial-up connections for modems, IDSN,
    Frame Relay, and other technologies. It replaced SLIP in almost all cases. PPTP is the
    Point-to-Point Tunneling Protocol used for VPNs, and SLAP is not a protocol at all!

  2. B. While non-IP protocols like IPX/SPX, NetBEUI, and AppleTalk are rare in modern
    networks, they can present a challenge because many firewalls are not capable of filtering
    them. This can create risks when they are necessary for an application or system’s function

Free download pdf