CISSP Qs
CISSP Qs
Every Monday, the London branch of a manufacturing company sends its weekly sales
figures for the prior week to corporate headquarters in Seattle. It is imperative to use
the most secure method of data transmission.
3. You are in charge of deciding what technology to use for this data transfer. The
BEST alternative is
a. X.25 protocol
b. A permanent virtual circuit (PVC)
c. A virtual private network (VPN)
d. An optical carrier-class (OC-class) carrier
4. Your boss is confused about the merits of RIP (routing information protocol) and
OSPF (open shortest path first). You explain that
a. RIP is preferable because variable length subnet masks (VLSMs) are
supported in all versions
b. OSPF is preferable because it is more flexible and inherently more secure
c. RIP is preferable because OSPF is only used in smaller networks
d. RIP is preferable because it is more flexible and inherently more secure
5. London is one of a number of small branch offices, and there is no local
authentication server. The employees must, therefore, authenticate to a domain
controller at the corporate office. The best method of authentication involves
a. A dial-up virtual private network (VPN)
b. Establishing a private virtual circuit (PVC) to forward the request
c. A Windows server running routing and remote access (RRAS) configured
as a remote authentication dial in user service (RADIUS) client
d. Synchronous optical network (SONET)
6. You advise the use of Layer 2 Tunneling Protocol (L2TP) virtual private networks
(VPN) for people working outside of the branch offices or headquarters because
a. A L2TP VPN is automatically encrypted. This removes the responsibility
of remembering to encrypt from the shoulders of employees and enables
them to focus on their jobs
b. Data entering the enterprise is encrypted and will pose no internal danger
c. You can chose to use Encapsulating Security Payload (ESP) with internet
protocol security (IPSec) when you set up the VPN to make the remote
communication more secure
d. Full-disk encryption makes the use of VPNs unnecessary
7. The head office has decided to use Kerberos for network authentication. The
company has a number of remote offices scattered across the country. What
problems might this present?
a. Kerberos is time sensitive in its default configuration
b. Kerberos logons are sent in plaintext
c. If the central key distribution center (KDC) fails, then all logons will fail
d. The key distribution center (KDC) retrieves passwords from the security
accounts manager (SAM)
8. Which of the following is a network configuration protocol for hosts on internet
protocol (IP) networks and provides other configuration information, particularly
the IP addresses of local caching DNS resolvers, network boot servers, and
other service hosts?
a. DHCP (Dynamic Host Configuration Protocol)
b. NIS (Network Information Service)
c. DNS (Domain Name Service)
d. LDAP (Lightweight Directory Access Protocol)
9. Which statement is TRUE concerning internet protocol (IP)V4 and IPV6 security?
a. IPV6 is less security than IPV4. IPV6 allows every node to have its own
IP address. IPV4 allows shielding private addresses behind public
addresses
b. IPV6 is less security than IPV4. Although there is still a centralizing body,
it is now international and terrorist organizations may now get IP
addresses
c. IPV6 is more security than IPV4. IPV6 mandates the use of internet
protocol security (IPSec)
d. IPV6 is more secure than IPV4. Only enterprises that have been
governmentally approved may use it
10. You are a CISSP working for a small corporation with responsibility for providing
security advice to the internet technology (IP) department. Your primary concern
for training all employees in the company on security awareness is defending
against
a. Denial of service
b. Malware
c. Social engineering
d. Botnets