100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CISSP PRACTICE TEST 1 250 EXAM REVIEW QUESTIONS AND ANSWERS, | latest 2024/25 exams updates |VERIFIED/

Rating
-
Sold
-
Pages
35
Grade
A+
Uploaded on
29-03-2024
Written in
2023/2024

CISSP PRACTICE TEST 1 250 EXAM REVIEW QUESTIONS AND ANSWERS, VERIFIED/ *baseline - -NIST SP 800-53 discusses security control baselines as a list of security controls. CIS releases security baselines, and a baseline is a useful part of a threat management strategy and may contain a list of acceptable configuration items. *Content Distribution Network (CDN) - -is designed to provide reliable, low-latency, geographically distributed content distribution. In this scenario, a CDN is an ideal solution. A P2P CDN like BitTorrent isn't a typical choice for a commercial entity, whereas redundant servers or a hot site can provide high availability but won't provide the remaining requirements. Blocking read commands sent to the device - -A forensic disk controller performs four functions. One of those, write blocking, intercepts write commands sent to the device and prevents them from modifying data on the device. The other three functions include returning data requested by a read operation, returning access-significant information from the device, and reporting errors from the device back to the forensic host. The controller should not prevent read commands from being sent to the device because those commands may return crucial information. RAID 1 - -Disk mirroring, requires two physical disks that will contain copies of the same data. TGS, or Ticket-Granting Service (which is usually on the same server as the KDC) - -receives a TGT from the client. It validates the TGT and the user's rights to access the service they are requesting to use. The TGS then issues a ticket and session keys to the client. The AS serves as the authentication server, which forwards the username to the KDC. *Asynchronous - -X communications rely on a a built-in stop and start flag or bit. This makes asynchronous communications less efficient than synchronous communications, but better suited to some types of communication. *Wave pattern - -X motion detectors transmit ultrasonic or microwave signals into the monitor area, watching for changes in the returned signals bouncing off objects. A stateful packet inspection firewall - -X, also known as dynamic packet filtering firewalls, track the state of a conversation, and can allow a response from a remote system based on an internal system being allowed to start the communication. Static packet filtering and circuit level gateways only filter based on source, destination, and ports, whereas application-level gateway firewalls proxy traffic for specific applications. A captive portal - -X can require those who want to connect to and use Wi-Fi to provide an email address to connect. This allows Ben to provide easy-to-use wireless while meeting his business purposes. WPA2 PSK is the preshared key mode of WPA and won't provide information about users who are given a key. Sharing a password doesn't allow for data gathering either. Port security is designed to protect wired network ports based on MAC addresses. *Set up a separate SSID using WPA2. - -Many modern wireless routers can provide multiple SSIDs. Ben can create a private, secure network for his business operations, but he will need to make sure that the customer and business networks are firewalled or otherwise logically separated from each other. Running WPA2 on the same SSID isn't possible without creating another wireless network and would cause confusion for customers (SSIDs aren't required to be unique). Running a network in Enterprise mode isn't used for open networks, and WEP is outdated and incredibly vulnerable. Open networks are unencrypted, making traffic easily sniffable. - -Unencrypted open networks broadcast traffic in the clear. This means that unencrypted sessions to websites can be easily captured with a packet sniffer. Some tools like FireSheep have been specifically designed to capture sessions from popular websites. Fortunately, many now use TLS by default, but other sites still send user session information in the clear. Shared passwords are not the cause of the vulnerability, ARP spoofing isn't an issue with wireless networks, and a Trojan is designed to look like safe software, not to compromise a router. *AES - -The DES modes of operation are Electronic Codebook (ECB), Cip

Show more Read less
Institution
CISSP PRACTICE
Course
CISSP PRACTICE











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISSP PRACTICE
Course
CISSP PRACTICE

Document information

Uploaded on
March 29, 2024
Number of pages
35
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QuickPass Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
414
Member since
3 year
Number of followers
304
Documents
6372
Last sold
1 week ago
Get all Documents you need at discount.

All nursing docs available: question banks, summaries, study guide and test banks

3.8

97 reviews

5
52
4
11
3
10
2
10
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions