Search Header Logo

CISSP Domain 4

Authored by Miftah Rahman

Computers

Professional Development

Used 21+ times

CISSP Domain 4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following best describes the role of a Bastion Host in network security architecture?

A highly secured computer designed to withstand attacks and provide controlled access to internal systems

A server placed in a DMZ that typically runs proxy or gateway services for external users.

Any host that has been hardened with security patches and minimal services to reduce its attack surface.

A network device that acts as an intermediary between external networks and protected internal resources.

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A financial company receives multiple phishing emails that appear to come from its official domain. The emails are sent from unauthorized mail servers, and some of them have been altered during transmission. The company wants to ensure that:

  1. 1. Only legitimate mail servers can send emails on behalf of the domain.

  2. 2. The integrity of the message is preserved so recipients know it has not been tampered with.

  3. 3. Clear policies are enforced so receiving mail servers can reject or quarantine fraudulent emails.

Which combination of technologies should the company implement to achieve these goals?

Use SPF to restrict authorized senders, DKIM for message integrity, and DMARC for policy enforcement.

Use SPF to encrypt emails, DKIM to authenticate users, and DMARC to provide end-to-end encryption.

Use DMARC to filter spam, SPF to provide confidentiality, and DKIM to hide sensitive data.

Use TLS for authentication, SPF for data integrity, and DMARC for message encryption.

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

What does a Synchronous (SYN) flood attack do?

Forces Transmission Control Protocol /Internet Protocol (TCP/IP) connections into a reset state

Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections

Empties the queue of pending Transmission Control Protocol /Internet Protocol (TCP/IP) requests

Exceeds the limits for new Transmission Control Protocol /Internet Protocol (TCP/IP) connections

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

In a High Availability (HA) environment, what is the PRIMARY goal of working with a virtual router address as the gateway to a network?

The second of two routers can periodically check in to make sure that the first router is operational.

The second of two routers can better absorb a Denial of Service (DoS) attack knowing the first router is present.

The first of two routers fails and is reinstalled, while the second handles the traffic flawlessly.

The first of two routers can better handle specific traffic, while the second handles the rest of the traffic seamlessly.

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

How does Encapsulating Security Payload (ESP) in transport mode affect in the Internet Protocol (IP)?

Authenticates the IP payload and selected portions of the IP header

Encrypts and optionally authenticates the complete IP packet

Encrypts and optionally authenticates the IP header, but not the IP payload

Encrypts and optionally authenticates the IP payload, but not the IP header

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following type of traffic can easily be filtered with a stateful packet filter by enforcing the context or state of the request?

ICMP

TCP

UDP

IP

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

When referring to the data structures of a packet, the term Protocol Data Unit (PDU) is used, what is the proper term to refer to a single unit of TCP data at the transport layer?

TCP Segment

TCP Datagram

TCP Frame

TCP Packet

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?