CISSP Practice Test Questions

1487 Questions


Topic 13: New Questions B

Which of the following provides the MOST comprehensive filtering of Peer-to-Peer (P2P)
traffic?


A.

Application proxy


B.

Port filter


C.

Network boundary router


D.

Access layer switch





D.
  

Access layer switch



Drag the following Security Engineering terms on the left to the BEST definition on the right.








In an organization where Network Access Control (NAC) has been deployed, a device
trying to connect to the network is being placed into an isolated domain. What could be
done on this device in order to obtain proper
connectivity?


A.

Connect the device to another network jack


C.

Apply Operating System (OS) patches


D.

Change the Message Authentication Code (MAC) address of the network interface





B.
  

Access to which of the following is required to validate web session management?


A.

Log timestamp


B.

Live session traffic


C.

Session state variables


D.

Test scripts





B.
  

Live session traffic



An organization recently conducted a review of the security of its network applications. One
of the
vulnerabilities found was that the session key used in encrypting sensitive information to a
third party server had been hard-coded in the client and server applications. Which of the
following would be MOST effective in mitigating this vulnerability?


A.

Diffle-Hellman (DH) algorithm


B.

Elliptic Curve Cryptography (ECC) algorithm


C.

Digital Signature algorithm (DSA)


D.

Rivest-Shamir-Adleman (RSA) algorithm





D.
  

Rivest-Shamir-Adleman (RSA) algorithm



Which of the following would an attacker BEST be able to accomplish through the use of Remote Access Tools (RAT)?


A.

Reduce the probability of identification


B.

Detect further compromise of the target


C.

Destabilize the operation of the host


D.

Maintain and expand control





D.
  

Maintain and expand control



From a security perspective, which of the following assumptions MUST be made about input to an
application?


A.

It is tested


B.

It is logged


C.

It is verified


D.

It is untrusted





D.
  

It is untrusted



A chemical plan wants to upgrade the Industrial Control System (ICS) to transmit data using Ethernet instead
of RS422. The project manager wants to simplify administration and maintenance by utilizing the office
network infrastructure and staff to implement this upgrade.
Which of the following is the GREATEST impact on security for the network?


A.

The network administrators have no knowledge of ICS


B.

The ICS is now accessible from the office network


C.

The ICS does not support the office password policy


D.

RS422 is more reliable than Ethernet





B.
  

The ICS is now accessible from the office network



Which of the following is the MOST efficient mechanism to account for all staff during a
speedy nonemergency evacuation from a large security facility?


A.

Large mantrap where groups of individuals leaving are identified using facial recognition technology


B.

Radio Frequency Identification (RFID) sensors worn by each employee scanned by sensors at each exitdoor


C.

Emergency exits with push bars with coordinates at each exit checking off the individual against a predefined list


D.

Card-activated turnstile where individuals are validated upon exit





B.
  

Radio Frequency Identification (RFID) sensors worn by each employee scanned by sensors at each exitdoor



Which of the following would an attacker BEST be able to accomplish through the use of Remote Access
Tools (RAT)?


A.

Reduce the probability of identification


B.

Detect further compromise of the target


C.

Destabilize the operation of the host


D.

Maintain and expand control





D.
  

Maintain and expand control



An organization has discovered that users are visiting unauthorized websites using anonymous proxies. Which of the following is the BEST way to prevent future occurrences?


A.

Remove the anonymity from the proxy


B.

Analyze Internet Protocol (IP) traffic for proxy requests


C.

Disable the proxy server on the firewall


D.

Block the Internet Protocol (IP) address of known anonymous proxies





D.
  

Block the Internet Protocol (IP) address of known anonymous proxies



When developing a business case for updating a security program, the security program
owner MUST do
which of the following?


A.

Identify relevant metrics


B.

Prepare performance test reports


C.

Obtain resources for the security program


D.

Interview executive management





A.
  

Identify relevant metrics




Page 53 out of 124 Pages
Previous