CISSP Sybex Official Study Guide Chapter 12 Review Questions Flashcards

1
Q

___________________ is a layer 2 connection mechanism that uses packet-switching technology to establish virtual circuits between the communication endpoints.

A. ISDN
B. Frame Relay
C. SMDS
D. ATM

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 574). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tunnel connections can be established over all except for which of the following?

A. WAN links
B. LAN pathways
C. Dial-up connections
D. Stand-alone systems

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 574). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___________________ is a standards-based mechanism for providing encryption for point-to-point TCP/IP traffic.

A. UDP
B. IDEA
C. IPsec
D. SDLC

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 574). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following IP addresses is not a private IP address as defined by RFC 1918?

A. 10.0.0.18
B. 169.254.1.119
C. 172.31.8.204
D. 192.168.6.43

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 574). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following cannot be linked over a VPN?

A. Two distant internet-connected LANs
B. Two systems on the same LAN
C. A system connected to the internet and a LAN connected to the internet
D. Two systems without an intermediary network connection

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 574). Wiley. Kindle Edition.

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 574). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is needed to allow an external client to initiate a communication session with an internal system if the network uses a NAT proxy?

A. IPsec tunnel
B. Static mode NAT
C. Static private IP address
D. Reverse DNS

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 574). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following VPN protocols do not offer native data encryption? (Choose all that apply.)

A. L2F
B. L2TP
C. IPsec
D. PPTP

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 575). Wiley. Kindle Edition.
Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 575). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

At which OSI model layer does the IPsec protocol function?

A. Data Link
B. Transport
C. Session
D. Network

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 575). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What technology allows for phone conversations to occur over an existing TCP/IP network and internet connection?

A. IPsec
B. VoIP
C. SSH
D. TLS

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 575). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not a benefit of NAT?

A. Hiding the internal IP addressing scheme
B. Sharing a few public internet addresses with a large number of internal clients
C. Using the private IP addresses from RFC 1918 on an internal network
D. Filtering network traffic to prevent brute-force attacks

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 575). Wiley. Kindle Edition.

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 575). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A significant benefit of a security control is when it goes unnoticed by users. What is this called?

A. Invisibility
B. Transparency
C. Diversion
D. Hiding in plain sight

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 575). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When you’re designing a security system for internet-delivered email, which of the following is least important?

A. Nonrepudiation
B. Availability
C. Message integrity
D. Access restriction

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 575). Wiley. Kindle Edition.

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 575). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is typically not an element that must be discussed with end users in regard to email retention policies?

A. Privacy
B. Auditor review
C. Length of retainer
D. Backup method

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 576). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is it called when email itself is used as an attack mechanism?

A. Masquerading
B. Mail-bombing
C. Spoofing
D. Smurf attack

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 576). Wiley. Kindle Edition.

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 576). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is spam so difficult to stop?

A. Filters are ineffective at blocking inbound messages.
B. The source address is usually spoofed.
C. It is an attack requiring little expertise.
D. Spam can cause denial-of-service attacks.

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 576). Wiley. Kindle Edition.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a type of connection that can be described as a logical circuit that always exists and is waiting for the customer to send data?

A. ISDN
B. PVC
C. VPN
D. SVC

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 576). Wiley. Kindle Edition.

A
17
Q

In addition to maintaining an updated system and controlling physical access, which of the following is the most effective countermeasure against PBX fraud and abuse?

A. Encrypting communications
B. Changing default passwords
C. Using transmission logs
D. Taping and archiving all conversations

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 576). Wiley. Kindle Edition.

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 576). Wiley. Kindle Edition.

A
18
Q

Which of the following can be used to bypass even the best physical and logical security mechanisms to gain access to a system?

A. Dictionary attacks
B. Denial of service
C. Social engineering
D. Port scanning

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 576). Wiley. Kindle Edition.

A
19
Q

Which of the following is not a denial-of-service attack?

A. Exploiting a flaw in a program to consume 100 percent of the CPU
B. Sending malformed packets to a system, causing it to freeze
C. Performing a brute-force attack against a known user account when account lockout is not present
D. Sending thousands of emails to a single address

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 577). Wiley. Kindle Edition.

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 577). Wiley. Kindle Edition.

A
20
Q

What authentication protocol offers no encryption or protection for logon credentials?

A. PAP
B. CHAP
C. SSL
D. RADIUS

Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (p. 577). Wiley. Kindle Edition.

A