CISSP Practice Questions

Which is the last line of defense in a physical security sense?

Correct! Wrong!

The high availability of multiple all-inclusive, easy-to-use hacking tools that do NOT require much technical knowledge has brought a growth of which?

Correct! Wrong!

Which one of the following affects the classification of data?

Correct! Wrong!

Which of the following components are considered part of the Trusted Computing Base?

Correct! Wrong!

Individual accountability does not include which of the following?

Correct! Wrong!

Which of the following developed to address some of the weaknesses in Kerberos and uses public key cryptography for the distribution of secret keys and provides additional control support?

Correct! Wrong!

Which of the following is NOT a system-sensing wireless proximity card?

Correct! Wrong!

Which of the following is the most costly countermeasure to reducing physical security risks?

Correct! Wrong!

Which of the following authentication mechanisms creates a problem for mobile users?

Correct! Wrong!

In what type of attack does an attacker try, from several encrypted messages, to figure out the key used in the encryption process?

Correct! Wrong!

The standard server port number for HTTP is which of the following?

Correct! Wrong!

Looking at the choices below, which ones would be most suitable protocols/tools for securing e-mails?

Correct! Wrong!

Which conceptual approach to intrusion detection system is the MOST common?

Correct! Wrong!

Which of the following is most affected by denial-of-service (DoS) attacks?

Correct! Wrong!

The Loki attack expoits a covert channel using which network protocol?

Correct! Wrong!

Which of the following is TRUE of network security?

Correct! Wrong!

Which of the following is NOT a correct notation for an IPv6 address?

Correct! Wrong!

Which layer deals with Media Access Control (MAC) addresses?

Correct! Wrong!

What is a decrease in amplitude as a signal propagates along a transmission medium BEST known as?

Correct! Wrong!

Which device acting as a translator is used to connect two networks or applications from Layer 4 up to Layer 7 of the ISO/OSI Model?

Correct! Wrong!

In which layer of the OSI Model are connection-oriented protocols located in the TCP/IP suite of protocols?

Correct! Wrong!

Which of the following transmission media would NOT be affected by cross talk or interference?

Correct! Wrong!

What is called an attack where the attacker spoofs the source IP address in an ICMP ECHO broadcast packet so it seems to have originated at the victim's system, in order to flood it with REPLY packets?

Correct! Wrong!

This OSI layer has a service that negotiates transfer syntax and translates data to and from the transfer syntax for users, which may represent data using different syntaxes. At which of the following layers would you find such service?

Correct! Wrong!

The International Organization for Standardization / Open Systems Interconnection (ISO/OSI) Layer 7 does NOT include which of the following?

Correct! Wrong!

CISSP Practice Questions