试卷名称:CISSP认证考试(通信安全与网络安全)模拟试卷1

上一题: There are several different types o...
下一题: What type of technology is represen...
单项选择题

What type of security encryption component is missing from the table that follows?   

A.Service Set ID

B.Temporal Key Integrity Protocol

C.Ad hoc WLAN

D.Open system authentication

您可能感兴趣的题目

Layer 2 of the OSI model has two sublayers. What are those sublayers, and what are two IEEE standards that describe technologies at that layer? LCL and MAC; IEEE 802.2 and 802.3 LCL and MAC; IEEE 802.1 and 802.3 Network and MAC; IEEE 802.1 and 802.3 LLC and MAC; IEEE 802.2 and 802.3
Which of the following categories of routing protocols builds a topology database of the network? Dynamic Distance-vector Link-state Static
Which of the following is not a benefit of VoIP? Cost Convergence Flexibility Security
Brad is a security manager at Thingamabobs Inc. He is preparing a presentation for his company’s executives on the risks of using instant messaging (IM) and his reasons for wanting to prohibit its use on the company network. Which of the following should not be included in his presentation? Sensitive data and files can be transferred from system to system over IM. Users can receive information—including malware—from an attacker posing as a legitimate sender. IM use can be stopped by simply blocking specific ports on the network firewalls. A security policy is needed specifying IM usage restrictions.
There are several different types of authentication technologies. Which type is being shown in the graphic that follows? [*] 802. lx Extensible Authentication Protocol Frequency hopping spread spectrum Orthogonal frequency-division multiplexing
What type of security encryption component is missing from the table that follows? [*] Service Set ID Temporal Key Integrity Protocol Ad hoc WLAN Open system authentication
What type of technology is represented in the graphic that follows? [*] Asynchronous Transfer Mode Synchronous Optical Networks Frequency-division multiplexing Multiplexing
IPv6 has many new and different characteristics and functionality compared to IPv4. Which of the following is an incorrect functionality or characteristic of IPv6? i. IPv6 allows for nonscoped addresses, which enables an administrator to restrict specific addresses for specific servers or file and print sharing, for example. ii. IPv6 has IPSec integrated into the protocol stack, which provides application-based secure transmission and authentication, iii. IPv6 has more flexibility and routing capabilities compared to IPv4 and allows for Quality of Service (QoS) priority values to be assigned to timesensitive transmissions. iv. The protocol offers autoconfiguration, which makes administration much easier compared to IPv4, and it does not require network address translation (NAT) to extend its address space. i, iii i, ii ii, iii ii, iv
Hanna is a new security manager for a computer consulting company. She has found out that the company has lost intellectual property in the past because malicious employees installed rogue devices on the network, which were used to capture sensitive traffic. Hanna needs to implement a solution that ensures only authorized devices are allowed access to the company network. Which of the following IEEE standards was developed for this type of protection? IEEE 802.1AR IEEE 802.1 AE IEEE 802.1 AF IEEE 802.1 XR
______is a set of extensions to DNS that provides to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attack types. Resource records Zone transfer DNSSEC Resource transfer
Which of the following best describes the difference between a virtual firewall that works in bridge mode versus one that is embedded into a hypervisor? Bridge-mode virtual firewall allows the firewall to monitor individual traffic links, and hypervisor integration allows the firewall to monitor all activities taking place within a host system. Bridge-mode virtual firewall allows the firewall to monitor individual network links, and hypervisor integration allows the firewall to monitor all activities taking place within a guest system. Bridge-mode virtual firewall allows the firewall to monitor individual traffic links, and hypervisor integration allows the firewall to monitor all activities taking place within a guest system. Bridge-mode virtual firewall allows the firewall to monitor individual guest systems, and hypervisor integration allows the firewall to monitor all activities taking place within a network system.
Several different tunneling protocols can be used in dial-up situations. Which of the following would be best to use as a VPN tunneling solution? L2P PPTP IPSec L2TP
Which of the following correctly describes Bluejacking? Bluejacking is a harmful, malicious attack. It is the process of taking over another portable device via a Bluetoothenabled device. It is commonly used to send contact information. The term was coined by the use of a Bluetooth device and the act of hijacking another device.
DNS is a popular target for attackers due to its strategic role on the Internet. What type of attack uses recursive queries to poison the cache of a DNS server? DNS spoofing Manipulation of the hosts file Social engineering Domain litigation
Angela wants to group together computers by department to make it easier for them to share network resources. Which of the following will allow her to group computers logically? VLAN Open network architecture Intranet VAN
Which of the following incorrectly describes how routing commonly takes place on the Internet? EGP is used in the areas “between“ each AS. Regions of nodes that share characteristics and behaviors are called ASs. CAs are specific nodes that are responsible for routing to nodes outside of their region. Each AS uses IGP to perform routing functionality.
Both de facto and proprietary interior protocols are in use today. Which of the following is a proprietary interior protocol that chooses the best path between the source and destination? IGRP RIP BGP OSPF
When an organization splits naming zones, the names of its hosts that are only accessible from an intranet are hidden from the Internet. Which of the following best describes why this is done? To prevent attackers from accessing servers To prevent the manipulation of the hosts file To avoid providing attackers with valuable information that can be used to prepare an attack To avoid providing attackers with information needed for cybersquatting
What type of telecommunication technology is illustrated in the graphic that follows? [*] Digital Subscriber Line Integrated Services Digital Network BRI ISDN Cable modem
There are common cloud computing service models.______ usually requires companies to deploy their own operating systems, applications, and software onto the provided infrastructure.______is the software environment that runs on top of the infrastructure. In the ______model the provider commonly gives the customers network-based access to a single copy of an application. Platform as a Service, Infrastructure as a Service, Software as a Service Platform as a Service, Platform as Software, Application as a Service Infrastructure as a Service, Application as a Service, Software as a Service Infrastructure as a Service, Platform as Software, Software as a Service

相关试卷

  • CISSP认证考试模拟试卷4

  • CISSP认证考试模拟试卷3

  • CISSP认证考试模拟试卷2

  • CISSP认证考试模拟试卷1

  • CISSP认证考试(软件开发安全)模拟试卷1

  • CISSP认证考试(访问控制)模拟试卷1

  • CISSP认证考试(信息安全治理与风险管理)模拟试卷1

  • CISSP认证考试(通信安全与网络安全)模拟试卷1

  • CISSP认证考试(安全体系结构和设计)模拟试卷1

  • CISSP认证考试(密码学)模拟试卷1

  • CISSP认证考试(物理安全与环境安全)模拟试卷1

  • CISSP认证考试(法律、法规、调查与合规)模拟试卷1

  • CISSP认证考试(业务连续性和灾难恢复)模拟试卷1

  • CISSP认证考试(安全运营)模拟试卷1