Allison Mernka
Quiz von , erstellt am more than 1 year ago

CISSP Information Security Quiz am CISSP Official Study Guide Questions (10-12), erstellt von Allison Mernka am 19/11/2021.

7
1
0
Allison Mernka
Erstellt von Allison Mernka vor mehr als 4 Jahre
Schließen

CISSP Official Study Guide Questions (10-12)

Frage 1 von 60

1

Which of the following is the most important aspect of security?

Wähle eine der folgenden:

  • Physical security

  • Intrusion detection

  • Logical security

  • Awareness training

Erklärung

Frage 2 von 60

1

What method can be used to map out the needs of an organization for a new facility?

Wähle eine der folgenden:

  • Log file audit

  • Critical path analysis

  • Risk analysis

  • Inventory

Erklärung

Frage 3 von 60

1

What infrastructure component is often located in the same position across multiple floors in order to provide a convenient means of linking floor-based networks together?

Wähle eine der folgenden:

  • Server room

  • Wiring closet

  • Datacenter

  • Media cabinets

Erklärung

Frage 4 von 60

1

Which of the follwoing is not a security-focused design element of a facility or site?

Wähle eine der folgenden:

  • Separation of work and visitor areas

  • Restricted access to areas with higher value or importance

  • Confidential assets located in the heart or center of a facility

  • Equal access to all locations within a facility

Erklärung

Frage 5 von 60

1

Which of the following does not need to be true in order to maintain the most efficient and secure server room?

Wähle eine der folgenden:

  • It must be human compatible.

  • It must include the use of nonwater fire suppressants

  • The humidity must be kept between 40 and 60 percent

  • The temperature must be kept between 60 and 75 degrees Fahrenheit

Erklärung

Frage 6 von 60

1

Which of the following is not a typical security measure implmented in relation to a media storage facility containing reusable removable media?

Wähle eine der folgenden:

  • Employing a librarian or custodian

  • Using a check-in/check-out process

  • Hashing

  • Using sanitization tools on returned media

Erklärung

Frage 7 von 60

1

Which of the following is a double set of doors that is often protected by a guard and is used to contain a subject until their identity and authentication are verified?

Wähle eine der folgenden:

  • Gate

  • Turnstile

  • Mantrap

  • Proximity detector

Erklärung

Frage 8 von 60

1

What is the most common form of perimeter security devices or mechanisms?

Wähle eine der folgenden:

  • Security guards

  • Fences

  • CCTV

  • Lighting

Erklärung

Frage 9 von 60

1

Which of the following is not a disadvantage of using security guards?

Wähle eine der folgenden:

  • Security guards are usually unaware of the scope of the operations within a facility.

  • Not all environments and facilities support security guards.

  • Not all security guards are themselves reliable.

  • Prescreening, bonding, and training do not guarantee effective and reliable security guards.

Erklärung

Frage 10 von 60

1

What is the most common cause of a false positive for a water-based fire supporession system?

Wähle eine der folgenden:

  • Water shortage

  • People

  • Ionization detectors

  • Placement of detectors in drop ceilings

Erklärung

Frage 11 von 60

1

What is the most common and inexpensive form of physical access control device?

Wähle eine der folgenden:

  • Lighting

  • Security guard

  • Key locks

  • Fences

Erklärung

Frage 12 von 60

1

What type of motion detector senses changes in the electrical or magnetic field surrounding a monitored object?

Wähle eine der folgenden:

  • Wave

  • Photoelectric

  • Heat

  • Capacitance

Erklärung

Frage 13 von 60

1

Which of the following is not a typical type of alarm that can be triggered for physical security?

Wähle eine der folgenden:

  • Preventive

  • Deterrent

  • Repellant

  • Notification

Erklärung

Frage 14 von 60

1

No matter what form of physical access control is used, a security guard or other monitoring system may be deployed to prevent all but which of the following?

Wähle eine der folgenden:

  • Piggybacking

  • Espionage

  • Masquerading

  • Abuse

Erklärung

Frage 15 von 60

1

What is the most important goal of all security solutions?

Wähle eine der folgenden:

  • Prevention of disclosure

  • Maintaining integrity

  • Human safety

  • Sustaining availability

Erklärung

Frage 16 von 60

1

What is the ideal humidity range for a computer room?

Wähle eine der folgenden:

  • 20-40 percent

  • 40-60 percent

  • 60-75 percent

  • 80-95 percent

Erklärung

Frage 17 von 60

1

Which of the following statements are not true in regards to static electricity?

Wähle eine der folgenden:

  • Electrostatic discharge can damage most computing comonents

  • Static charge accumulation is more prevalent when there is high humidity

  • Static discharge from a person to a metal object can be over 1,000 volts

  • Static electricity is not managed by the deployment of a UPS

Erklärung

Frage 18 von 60

1

A Type B fire extinguisher may use all except which o fthe follwoing supporession mediums?

Wähle eine der folgenden:

  • Water

  • CO2

  • Halon or an acceptable halon substitute

  • Soda acid

Erklärung

Frage 19 von 60

1

What is the best type of water-based fire suppression system for a computer facility?

Wähle eine der folgenden:

  • Wet pipe system

  • Dry pipe system

  • Preaction system

  • Deluge system

Erklärung

Frage 20 von 60

1

Which of the following is typically not a culprit in causing damage to computer equipment in the event of a fire and a triggered suppression?

Wähle eine der folgenden:

  • Heat

  • Suppression medium

  • Smoke

  • Light

Erklärung

Frage 21 von 60

1

What is layer 4 of the OSI model?

Wähle eine der folgenden:

  • Presentation

  • Network

  • Data Link

  • Transport

Erklärung

Frage 22 von 60

1

What is encapsulation?

Wähle eine der folgenden:

  • Changing the source and destination addresses of a packet

  • Adding a header and possibly a footer to data as it moves down the OSI stack

  • Verifying a person's identity

  • Protecting evidence until it has been properly collected

Erklärung

Frage 23 von 60

1

Which OSI model layer manages communications in simplex, half-duplex, and full-duplex modes?

Wähle eine der folgenden:

  • Applicaiton

  • Session

  • Transport

  • Physical

Erklärung

Frage 24 von 60

1

Which of the following is the least resistant to EMI?

Wähle eine der folgenden:

  • Thinnet

  • UTP

  • STP

  • Fiber

Erklärung

Frage 25 von 60

1

Which of the following is not an example of network segmentation?

Wähle eine der folgenden:

  • Intranet

  • DMZ

  • Extranet

  • VPN

Erklärung

Frage 26 von 60

1

What is a field-powered technology that can be used for inventory management without requiring direct physical contact?

Wähle eine der folgenden:

  • IPX

  • RFID

  • SSID

  • SDN

Erklärung

Frage 27 von 60

1

If you are the victim of a bluejacking attack, what was compromised?

Wähle eine der folgenden:

  • Your firewall

  • Your switch

  • Your cell phone

  • Your web cookies

Erklärung

Frage 28 von 60

1

Which networking technology is based on the IEEE 802.3 standard?

Wähle eine der folgenden:

  • Ethernet

  • Token Ring

  • FDDI

  • HDLC

Erklärung

Frage 29 von 60

1

What is a TCP wrapper?

Wähle eine der folgenden:

  • An encapsulation protocol used by switches

  • An application that can serve as a basic firewall by restricting access based on user IDs or system IDs

  • A security protocol used to protect TCP/IP traffic over WAN links

  • A mechanism to tunnel TCP/IP through non-IP networks

Erklärung

Frage 30 von 60

1

What is both a benefit and a potentially harmful implication of multilayer protocols?

Wähle eine der folgenden:

  • Throughput

  • Encapsulation

  • Hash integrity checking

  • Logical addressing

Erklärung

Frage 31 von 60

1

By examining the source and destination addresses, the applicaiton usage, the source of origin, and the relationship between current packets with the previous packets of the same session, ________________ firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.

Wähle eine der folgenden:

  • Static packet-filtering

  • Application-level gateway

  • Stateful inspection

  • Circuit-level gateway

Erklärung

Frage 32 von 60

1

What type of firewall evaluates the context of network traffic to make allow and deny decisions?

Wähle eine der folgenden:

  • Application-level gateway

  • Stateful inspection

  • Circuit-level gateway

  • Static packet-filtering

Erklärung

Frage 33 von 60

1

Which of the following is not true regarding firewalls?

Wähle eine der folgenden:

  • They are able to log traffic information

  • They are able to block viruses

  • They are able to issue alarms based on suspected attacks

  • They are unable to prevent internal attacks.

Erklärung

Frage 34 von 60

1

Which of the following is not a routing protocol?

Wähle eine der folgenden:

  • OSPF

  • BGP

  • RPC

  • RIP

Erklärung

Frage 35 von 60

1

A _________________ is an intelligent hub because it knows the addresses of the systems connected on each outbound port. Instead of repeating traffic on every outbound port, it repeats traffic only out of the port on which the detination is known to exist.

Wähle eine der folgenden:

  • Repeater

  • Switch

  • Bridge

  • Router

Erklärung

Frage 36 von 60

1

Which of the following is not a technology specifically associated with 802.11 wireless networking?

Wähle eine der folgenden:

  • 802.1x

  • WPA

  • WEP

  • 802.11i

Erklärung

Frage 37 von 60

1

Which wireless frequency access method offers the greatest throughput with the least interference?

Wähle eine der folgenden:

  • FHSS

  • DSSS

  • OFDM

  • OSPF

Erklärung

Frage 38 von 60

1

What security concept encourages administrators to install firewalls, malware scanners, and an IDS on every host?

Wähle eine der folgenden:

  • Endpoint security

  • Network access control (NAC)

  • VLAN

  • RADIUS

Erklärung

Frage 39 von 60

1

What function does ARP perform?

Wähle eine der folgenden:

  • It is a routing protocol

  • It resolves IP addresses into MAC addresses

  • It resolves physical addresses into logical addresses

  • It manages multiplex streaming

Erklärung

Frage 40 von 60

1

What form of infrastructure mode wireless networking deployment supports large physical environments through the use of a single SSID but numerous access points?

Wähle eine der folgenden:

  • Stand-alone

  • Wired extension

  • Enterprise extension

  • Bridge

Erklärung

Frage 41 von 60

1

____________________ is a layer 2 connection mechanism that uses packet-switching technology to establish virtual circuits between the communicaiton endpoints.

Wähle eine der folgenden:

  • ISDN

  • Frame Relay

  • SMDS

  • ATM

Erklärung

Frage 42 von 60

1

Tunnel connections can be established over all except for which of the following?

Wähle eine der folgenden:

  • WAN links

  • LAN pathways

  • Dial-up connections

  • Stand-alone systems

Erklärung

Frage 43 von 60

1

_________________________ is a standards-based mechanism for providing encryption for point-to-point TCP/IP traffic.

Wähle eine der folgenden:

  • UDP

  • IDEA

  • IPSec

  • SDLC

Erklärung

Frage 44 von 60

1

Which of the following IP addresses is not a private IP address as defined by RFC 1918?

Wähle eine der folgenden:

  • 10.0.0.18

  • 169.254.1.119

  • 172.31.8.204

  • 192.168.6.43

Erklärung

Frage 45 von 60

1

Which of the following cannot be linked over a VPN?

Wähle eine der folgenden:

  • Two distant internet-connected LANs

  • Two systems on the same LAN

  • A system connected to the internet and a LAN connected to the internet

  • Two systems without an intermediary network connection

Erklärung

Frage 46 von 60

1

What is needed to allow an external client to initiate a communicaiton session with an internal system if the network uses a NAT proxy?

Wähle eine der folgenden:

  • IPsec tunnel

  • Static mode NAT

  • Static private IP address

  • Reverse DNS

Erklärung

Frage 47 von 60

1

Which of the following VPN protocols do not offer native data encryption? (Choose all that apply.)

Wähle eine oder mehr der folgenden:

  • L2F

  • L2TP

  • IPsec

  • PPTP

Erklärung

Frage 48 von 60

1

At which OSI model layer does the IPsec protocol function?

Wähle eine der folgenden:

  • Data Link

  • Transport

  • Session

  • Network

Erklärung

Frage 49 von 60

1

What technology allows for phone conversations to occur over an existing TCP/IP network and internet connection?

Wähle eine der folgenden:

  • IPsec

  • VoIP

  • SSH

  • TLS

Erklärung

Frage 50 von 60

1

Which of the following is not a benefit of NAT?

Wähle eine der folgenden:

  • Hiding the internal IP addressing scheme

  • Sharing a few public internet addresses with a large number of internal clients

  • Using the private IP addresses from RFC 1918 on an internal network

  • Filtering netwrok traffic to prevent brute-force attacks

Erklärung

Frage 51 von 60

1

A significant benefit of a security control is when it goes unnoticed by users. What is this called?

Wähle eine der folgenden:

  • Invisibility

  • Transparency

  • Diversion

  • Hiding in plain sight

Erklärung

Frage 52 von 60

1

When you're designing a security system for internet-delivered email, which of the following is least important?

Wähle eine der folgenden:

  • Nonrepudiation

  • Availability

  • Message integrity

  • Access restriction

Erklärung

Frage 53 von 60

1

Which of the following is typically not an element that must be discussed with end users in regard to email retention policies?

Wähle eine der folgenden:

  • Privacy

  • Auditor review

  • Length of retainer

  • Backup method

Erklärung

Frage 54 von 60

1

What is it called when email itself is used as an attack mechanism?

Wähle eine der folgenden:

  • Masquerading

  • Mail-bombing

  • Spoofing

  • Smurf attack

Erklärung

Frage 55 von 60

1

Why is spam so difficult to stop?

Wähle eine der folgenden:

  • Filters are ineffective at blocking inbound messages.

  • The source address is usually spoofed.

  • It is an attack requring little expertise

  • Spam can cause denial-of-service attacks.

Erklärung

Frage 56 von 60

1

Which of the following is a type of connection that can be described as a logical circuit that always exists and is waiting for the customer to send data?

Wähle eine der folgenden:

  • ISDN

  • PVC

  • VPN

  • SVC

Erklärung

Frage 57 von 60

1

In addition to maintaining an updated system and controlling physical access, which of the following is the most effective countermeasure against PBX fraud and abuse?

Wähle eine der folgenden:

  • Encrypting communications

  • Changing default passwords

  • Using transmission logs

  • Taping and archiving all conversations

Erklärung

Frage 58 von 60

1

Which of the following can be used to bypass even the best physical and logical security mechanisms to gain access to a system?

Wähle eine der folgenden:

  • Dictionary attacks

  • Denial of service

  • Social engineering

  • Port scanning

Erklärung

Frage 59 von 60

1

Which of the following is not a denial-of-service attack?

Wähle eine der folgenden:

  • Exploiting a flaw in a program to consume 100 percent of the CPU

  • Sending malformed packets to a system, causing it to freeze

  • Performing a brute-force attack against a known user account when account lockout is not present

  • Sending thousands of emails to a single address

Erklärung

Frage 60 von 60

1

What authentication protocol offers no encryption or protection for logon credentials?

Wähle eine der folgenden:

  • PAP

  • CHAP

  • SSL

  • RADIUS

Erklärung