CISSP Lesson 8 PreTest Flashcards
Which is a function of a gateway?
A) Copies packets from one network protocol to another protocol
B) Reads the network address of the destination and forwards the packet to that network
C) Filters packets going into and out of a network
Copies packets from one network protocol to another protocol
A DoS attack is typically against one machine, whereas a DDoS attack is against many machines.
A) TRUE
B) FALSE
TRUE
Which statement describes the hash totals security technique?
A) It allows users to access resources without knowing whether the resource is local or remote
B) It is an error-correcting protocol that re-creates blocks of text
C) It is a mathematically-generated unique value from a string of text that can be used when integrity must be assured
It is a mathematically-generated unique value from a string of text that can be used when integrity must be assured
Which e-mail protocol forwards e-mail from one mail server to another mail server?
A) POP
B) IMAP
C) SMTP
SMTP
What is a fifth-generation firewall?
A) A combination of second- and third-generation firewalls
B) A dynamic firewall
C) A multilevel firewall integrated into the OS kernel
A multilevel firewall integrated into the OS kernel
Which is a downside of packet filtering firewalls?
A) Easily fooled by spoofing
B) Allows for eavesdropping
C) Filters too much, causing a bottleneck
Easily fooled by spoofing
At which layer do second-generation firewalls operate?
A) Network
B) Transport
C) Application
Application
A flooding attack is considered to be which kind of attack?
A) Spoofing
B) Spamming
C) DoS
DoS
Switches only forward packets to the specific port where the destination machine is located.
A) TRUE
B) FALSE
TRUE
What do first- and third-generation firewalls have in common?
A) Both allow packets if they are a continuation of a previous connection
B) Both consider the source and destination addresses
C) Both change the source and destination address from the original packet
Both consider the source and destination addresses
A screened-subnet architecture is the ideal place for which type of server?
A) Web
B) Mail
C) Network
Web
Which statement describes a NAT function?
A) Translates nonroutable IP addresses behind a firewall to routable addresses
B) Uses the Internet to create a virtual private line
C) Captures and analyzes network packets
Translates nonroutable IP addresses behind a firewall to routable addresses
What is the definition of a class B network abuse?
A) Unauthorized access of restricted network resources
B) Unauthorized use of network resources for nonbusiness purposes
C) Denial of service and other disruptions
Unauthorized use of network resources for nonbusiness purposes
Which is a function of a hub?
A) Filters traffic based on DLL addresses
B) Connects multiple LAN devices
C) Forwards messages from one network segment to another
Connects multiple LAN devices
Which application layer protocol uses digital certificates and signatures to provide data confidentiality and integrity?
A) SET
B) S/MIME
C) PEM
SET