CISSP CBK Review Seminar -- Domain 4 Flashcards

1
Q
  1. Which of the following is the MAIN advantage of having an application gateway?

(A) To perform change control procedures for applications
(B) To provide a means for applications to move into production
(C) To log and control incoming and outgoing application traffic
(D) To audit and approve changes to applications

A

(C) To log and control incoming and outgoing application traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What is the purpose of the Encapsulating Security Payload (ESP) in the Internet Protocol (IP) Security Architecture for Internet Protocol Security (IPSec)?

(A) To provide non-repudiation and confidentiality for IP transmissions
(B) To provide integrity and confidentiality for IP transmissions
(C) To provide integrity and authentication for IP transmissions
(D) To provide key management and key distribution for IP transmissions

A

(B) To provide integrity and confidentiality for IP transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. To support legacy applications that rely on risky protocols (e.g., plain text passwords), which one of the following can be implemented to mitigate the risks on a corporate network?

(A) Implement strong, centrally-generated passwords to control use of the vulnerable applications
(B) Implement a Virtual Private Network (VPN) with controls on workstations joining the VPN
(C) Use physical access controls to ensure that only authorized, trained users have access to workstations
(D) Ensure audit logging is enabled on all hosts and applications with frequent log reviews

A

(B) Implement a Virtual Private Network (VPN) with controls on workstations joining the VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What type of networking model can be deployed for small, inexpensive, and less secure networking?

(A) Wide Area Network (WAN)
(B) Metropolitan Area Network (MAN)
(C) Campus Area Network (CAN)
(D) Peer-to-Peer Network (P2P)

A

(D) Peer-to-Peer Network (P2P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Initial and ongoing authentication can be used as mitigation against which of the following network attacks?

(A) Spoofing
(B) Tampering
(C) Side channel
(D) Traffic analysis

A

(A) Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which one of the following is an example of electronic piggybacking?

(A) Attaching to a communications line and injecting data
(B) Abruptly terminating a dial-up or direct-connect session
(C) Following an authorized user into the computer room
(D) Recording and playing back computer transactions

A

(A) Attaching to a communications line and injecting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Wired Equivalent Privacy (WEP) uses which of the following ciphers?

(A) Rivest-Shamir-Adleman (RSA)
(B) Triple Data Encryption Standard (3DES)
(C) Advanced Encryption Standard (AES)
(D) Rivest Cipher 4 (RC4)

A

(D) Rivest Cipher 4 (RC4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. The purpose of the Internet Protocol Security (IPSec) Authentication Header (AH) is to provide

(A) Proof of delivery.
(B) Encryption of a payload.
(C) Validation of the sender.
(D) Validation of the recipient.

A

(C) Validation of the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What technology interleaves data frames from multiple conversations into a single data stream for transmission?

(A) Time-Division Multiplexing (TDM)
(B) Real-time Transport Protocol (RTP)
(C) Synchronous Data Link Control (SDLC)
(D) Wired Equivalent Privacy 2 (WEP2)

A

(A) Time-Division Multiplexing (TDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Why does fiber optic communication technology have a significant security advantage over other transmission technology?

(A) Higher data rates can be transmitted.
(B) Interception of data traffic is more difficult.
(C) Traffic analysis is prevented by multiplexing.
(D) Single and double-bit errors are correctable.

A

(B) Interception of data traffic is more difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Which of the following is NOT a protection feature associated with Secure Sockets Layer (SSL)?

(A) Certificate-based authentication of web client
(B) Certificate-based authentication of web server
(C) Data confidentiality between client and web server
(D) Data confidentiality between two web servers

A

(D) Data confidentiality between two web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What is considered an industry standard for Internet Protocol Security (IPSec)
    remote access Virtual Private Networks (VPN) key exchange?

(A) Internet Key Exchange (IKE) Extended Authentication
(B) Internet Security Association and Key Management Protocol (ISAKMP)
(C) Transport Layer Security (TLS)
(D) Interior Gateway Routing Protocol (IGRP)

A

(A) Internet Key Exchange (IKE) Extended Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Referring to the following diagram, which of the following statements is most correct:

(A) Place the enterprise mail server in the DMZ area because a mail relay would not provide adequate mail service.
(B) Place a router between the Internet and the first firewall to provide appropriate warning that the firewall is under attack.
(C) VPN connections from a VPN concentrator should terminate at the firewall closest to the network to minimize traffic in the DMZ area.
(D) A protocol based network Intrusion Detection System (IDS) could be placed in the DMZ area.

A

(D) A protocol based network Intrusion Detection System (IDS) could be placed in the DMZ area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. The network topology that provides the MOST security and the least risk is:

(A) Symmetric networks because the increased amount of redundancy reduces the possibility of an integrity error occurring without being caught.
(B) Symmetric Key Cryptography because of its speed.
(C) Bus because all users are on the same LAN segment.
(D) Ring if it is dedicated with no external connections

A

(D) Ring if it is dedicated with no external connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. IPSEC (IP Security), S-HTTP (Secure HTTP) and SSL (Secure Socket Layer) are examples of ?

(A) Secure Multi-purpose Internet Mail Extensions (S/MIME).
(B) Secure Internet protocols.
(C) Internet transaction protocols.
(D) Application protocol interfaces.

A

(B) Secure Internet protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which of the following statements is true about traffic passing from the DMZ interface to the inside interface?

(A) Traffic is allowed access by default.
(B) Traffic is blocked by default
(C) Traffic passes if the access control lists are established between the inside
and the DMZ.
(D) Traffic passes if the inside security level is higher than the DMZ’s
interface’s level.

A

(B) Traffic is blocked by default