CISSP Lesson 8 PreTest Flashcards

2
Q

Which is a function of a gateway?
A) Copies packets from one network protocol to another protocol
B) Reads the network address of the destination and forwards the packet to that network
C) Filters packets going into and out of a network

A

Copies packets from one network protocol to another protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A DoS attack is typically against one machine, whereas a DDoS attack is against many machines.
A) TRUE
B) FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which statement describes the hash totals security technique?
A) It allows users to access resources without knowing whether the resource is local or remote
B) It is an error-correcting protocol that re-creates blocks of text
C) It is a mathematically-generated unique value from a string of text that can be used when integrity must be assured

A

It is a mathematically-generated unique value from a string of text that can be used when integrity must be assured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which e-mail protocol forwards e-mail from one mail server to another mail server?
A) POP
B) IMAP
C) SMTP

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a fifth-generation firewall?
A) A combination of second- and third-generation firewalls
B) A dynamic firewall
C) A multilevel firewall integrated into the OS kernel

A

A multilevel firewall integrated into the OS kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which is a downside of packet filtering firewalls?
A) Easily fooled by spoofing
B) Allows for eavesdropping
C) Filters too much, causing a bottleneck

A

Easily fooled by spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

At which layer do second-generation firewalls operate?
A) Network
B) Transport
C) Application

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A flooding attack is considered to be which kind of attack?
A) Spoofing
B) Spamming
C) DoS

A

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Switches only forward packets to the specific port where the destination machine is located.
A) TRUE
B) FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do first- and third-generation firewalls have in common?
A) Both allow packets if they are a continuation of a previous connection
B) Both consider the source and destination addresses
C) Both change the source and destination address from the original packet

A

Both consider the source and destination addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A screened-subnet architecture is the ideal place for which type of server?
A) Web
B) Mail
C) Network

A

Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which statement describes a NAT function?
A) Translates nonroutable IP addresses behind a firewall to routable addresses
B) Uses the Internet to create a virtual private line
C) Captures and analyzes network packets

A

Translates nonroutable IP addresses behind a firewall to routable addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the definition of a class B network abuse?
A) Unauthorized access of restricted network resources
B) Unauthorized use of network resources for nonbusiness purposes
C) Denial of service and other disruptions

A

Unauthorized use of network resources for nonbusiness purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which is a function of a hub?
A) Filters traffic based on DLL addresses
B) Connects multiple LAN devices
C) Forwards messages from one network segment to another

A

Connects multiple LAN devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which application layer protocol uses digital certificates and signatures to provide data confidentiality and integrity?
A) SET
B) S/MIME
C) PEM

A

SET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which transport layer protocol provides high availability using encryption?
A) SWIPE
B) SKIP
C) SSL

A

SKIP

18
Q

What comprises a screened-host architecture?
A) Packet filtering router
B) Packet filtering router and a bastion host
C) Packet filtering router, a bastion host, and two NICs

A

Packet filtering router and a bastion host

19
Q

Frame relay is a combination of digital telephony and data transport services.
A) TRUE
B) FALSE

A

FALSE

20
Q

Which is a network layer security protocol?
A) L2TP
B) TCP/IP
C) IPSec

A

IPSec

21
Q

What is a function of the IP portion of TCP/IP?A) Manages addressing the packets and getting them to the destinationB) Splits outbound messages into packetsC) Assembles inbound packets into messages

A

Manages addressing the packets and getting them to the destination