This CISSP Telecommunications & Networking quiz assesses knowledge on network defense, Ethernet layers, and intrusion detection placement. It's designed to enhance understanding of network security principles and proactive defense tactics, essential for security professionals.
Gathers firewall logs for archiving
Aggregates logs from security devices and application servers looking for suspicious activity
Reviews access controls logs on servers and physical entry points to match user system authorization with physical access permissions
Coordination software for security conferences and seminars.
Rate this question:
File server
IP phone
Security camera
All of the above
Rate this question:
A denial-of-service attack on servers on a network
Hacking into a router
A virus outbreak saturating network capacity
A man-in-the-middle attack
Rate this question:
Layer 1—Physical layer
Layer 2—Data-link layer
Layer 3—Network Layer
Layer 4—Transport Layer
Rate this question:
On the network perimeter, to alert the network administrator of all suspicious traffic
On network segments with business-critical systems; e.g., demilitarized zones (DMZs) and on certain intranet segments
At the network operations center (NOC)
At an external service provider
Rate this question:
A boundary router
A firewall
A proxy server
None of the above
Rate this question:
Fiber optics provides higher bandwidth.
Fiber optics are more difficult to wiretap.
Fiber optics are immune to wiretap.
None. The two are equivalent; network security is independent from the physical layer.
Rate this question:
Lack of physical access control
Demonstrably insecure standards
Implementation weaknesses
War driving
Rate this question:
Lack of authentication of servers, and thereby authenticity of records
Its latency, which enables insertion of records between the time when a record has expired and when it is refreshed
Th e fact that it is a simple, distributed, hierarchical database instead of a singular, relational one, thereby giving rise to the possibility of inconsistencies going undetected for a certain amount of time
Th e fact that addresses in e-mail can be spoofed without checking their validity in DNS, caused by the fact that DNS addresses are not digitally signed
Rate this question:
B and e
B, d, and e
A and c
A, c, and d
Rate this question:
A and d
A, b, and e
A, b, c, d, and f
A, b, c, e, and f
Rate this question:
Redundant firewalls
Business continuity planning
Disallowing P2P traffic
Perimeter surveillance and intelligence gathering
Rate this question:
An open e-mail relay is a server that forward e-mail from domains other than the ones it serves.
Open e-mail relays are a principal tool for distribution of spam.
Using a blacklist of open e-mail relays provides a secure way for an e-mail administrator to identify open mail relays and fi lter spam.
An open e-mail relay is widely considered a sign of bad system administration.
Rate this question:
Using an obscure SSID to confuse and distract an attacker
Not using any SSID at all to prevent an attacker from connecting to the network
Not broadcasting an SSID to make it harder to detect the WLAN
None of the above
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
CISSP Prep Quiz: Domain 1
This quiz contains example questions for the CISSP certification exam. The questions in this quiz were taken from the:
OFFICIAL (ISC)2® GUIDE TO THE CISSP® EXAM
Questions:
18 |
Attempts:
2397 |
Last updated:
Sep 04, 2023
|
Trivia Quiz On CISSP Exam!
Explore key concepts of the CISSP exam through this trivia quiz! Dive into security modes like Dedicated, System high, and Multilevel, enhancing your understanding of federal...
Questions:
29 |
Attempts:
198 |
Last updated:
Mar 20, 2023
|
CISSP Study Quiz 2
CISSP Study Quiz 2 assesses knowledge on key cybersecurity concepts including biometric systems, access control models, and authentication mechanisms. It prepares learners for...
Questions:
222 |
Attempts:
353 |
Last updated:
Mar 21, 2023
|
CISSP Study Quiz
The CISSP Study Quiz is designed to assess knowledge in information security, focusing on business continuity, risk management, and legal frameworks. It prepares learners for the...
Questions:
335 |
Attempts:
2945 |
Last updated:
Mar 21, 2023
|
Highmark- CISSP Initial Skill Set Evaluation
The 'Highmark- CISSP Initial Skill Set Evaluation' assesses foundational skills in network and information security. It evaluates understanding of access controls, authentication...
Questions:
43 |
Attempts:
484 |
Last updated:
Jun 18, 2024
|
|
CISSP- Security Architecture And Design
This CISSP quiz focuses on Security Architecture and Design, assessing knowledge in frameworks like SABSA, ITIL, and standards such as ISO 27001. It covers lifecycle development,...
Questions:
20 |
Attempts:
759 |
Last updated:
Mar 21, 2023
|
|
Wait!
Here's an interesting quiz for you.