CISSP PRACTICE TEST 1 250 EXAM REVIEW QUESTIONS AND ANSWERS, | latest 2024/25 exams updates |VERIFIED/
CISSP PRACTICE TEST 1 250 EXAM REVIEW QUESTIONS AND ANSWERS, VERIFIED/ *baseline - -NIST SP 800-53 discusses security control baselines as a list of security controls. CIS releases security baselines, and a baseline is a useful part of a threat management strategy and may contain a list of acceptable configuration items. *Content Distribution Network (CDN) - -is designed to provide reliable, low-latency, geographically distributed content distribution. In this scenario, a CDN is an ideal solution. A P2P CDN like BitTorrent isn't a typical choice for a commercial entity, whereas redundant servers or a hot site can provide high availability but won't provide the remaining requirements. Blocking read commands sent to the device - -A forensic disk controller performs four functions. One of those, write blocking, intercepts write commands sent to the device and prevents them from modifying data on the device. The other three functions include returning data requested by a read operation, returning access-significant information from the device, and reporting errors from the device back to the forensic host. The controller should not prevent read commands from being sent to the device because those commands may return crucial information. RAID 1 - -Disk mirroring, requires two physical disks that will contain copies of the same data. TGS, or Ticket-Granting Service (which is usually on the same server as the KDC) - -receives a TGT from the client. It validates the TGT and the user's rights to access the service they are requesting to use. The TGS then issues a ticket and session keys to the client. The AS serves as the authentication server, which forwards the username to the KDC. *Asynchronous - -X communications rely on a a built-in stop and start flag or bit. This makes asynchronous communications less efficient than synchronous communications, but better suited to some types of communication. *Wave pattern - -X motion detectors transmit ultrasonic or microwave signals into the monitor area, watching for changes in the returned signals bouncing off objects. A stateful packet inspection firewall - -X, also known as dynamic packet filtering firewalls, track the state of a conversation, and can allow a response from a remote system based on an internal system being allowed to start the communication. Static packet filtering and circuit level gateways only filter based on source, destination, and ports, whereas application-level gateway firewalls proxy traffic for specific applications. A captive portal - -X can require those who want to connect to and use Wi-Fi to provide an email address to connect. This allows Ben to provide easy-to-use wireless while meeting his business purposes. WPA2 PSK is the preshared key mode of WPA and won't provide information about users who are given a key. Sharing a password doesn't allow for data gathering either. Port security is designed to protect wired network ports based on MAC addresses. *Set up a separate SSID using WPA2. - -Many modern wireless routers can provide multiple SSIDs. Ben can create a private, secure network for his business operations, but he will need to make sure that the customer and business networks are firewalled or otherwise logically separated from each other. Running WPA2 on the same SSID isn't possible without creating another wireless network and would cause confusion for customers (SSIDs aren't required to be unique). Running a network in Enterprise mode isn't used for open networks, and WEP is outdated and incredibly vulnerable. Open networks are unencrypted, making traffic easily sniffable. - -Unencrypted open networks broadcast traffic in the clear. This means that unencrypted sessions to websites can be easily captured with a packet sniffer. Some tools like FireSheep have been specifically designed to capture sessions from popular websites. Fortunately, many now use TLS by default, but other sites still send user session information in the clear. Shared passwords are not the cause of the vulnerability, ARP spoofing isn't an issue with wireless networks, and a Trojan is designed to look like safe software, not to compromise a router. *AES - -The DES modes of operation are Electronic Codebook (ECB), Cip
Written for
- Institution
- CISSP PRACTICE
- Course
- CISSP PRACTICE
Document information
- Uploaded on
- March 29, 2024
- Number of pages
- 35
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cissp practice test 1 250 exam review questions