
CISSP Domain 4
Authored by Miftah Rahman
Computers
Professional Development
Used 21+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Which of the following best describes the role of a Bastion Host in network security architecture?
A highly secured computer designed to withstand attacks and provide controlled access to internal systems
A server placed in a DMZ that typically runs proxy or gateway services for external users.
Any host that has been hardened with security patches and minimal services to reduce its attack surface.
A network device that acts as an intermediary between external networks and protected internal resources.
2.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A financial company receives multiple phishing emails that appear to come from its official domain. The emails are sent from unauthorized mail servers, and some of them have been altered during transmission. The company wants to ensure that:
1. Only legitimate mail servers can send emails on behalf of the domain.
2. The integrity of the message is preserved so recipients know it has not been tampered with.
3. Clear policies are enforced so receiving mail servers can reject or quarantine fraudulent emails.
Which combination of technologies should the company implement to achieve these goals?
Use SPF to restrict authorized senders, DKIM for message integrity, and DMARC for policy enforcement.
Use SPF to encrypt emails, DKIM to authenticate users, and DMARC to provide end-to-end encryption.
Use DMARC to filter spam, SPF to provide confidentiality, and DKIM to hide sensitive data.
Use TLS for authentication, SPF for data integrity, and DMARC for message encryption.
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
What does a Synchronous (SYN) flood attack do?
Forces Transmission Control Protocol /Internet Protocol (TCP/IP) connections into a reset state
Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections
Empties the queue of pending Transmission Control Protocol /Internet Protocol (TCP/IP) requests
Exceeds the limits for new Transmission Control Protocol /Internet Protocol (TCP/IP) connections
4.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
In a High Availability (HA) environment, what is the PRIMARY goal of working with a virtual router address as the gateway to a network?
The second of two routers can periodically check in to make sure that the first router is operational.
The second of two routers can better absorb a Denial of Service (DoS) attack knowing the first router is present.
The first of two routers fails and is reinstalled, while the second handles the traffic flawlessly.
The first of two routers can better handle specific traffic, while the second handles the rest of the traffic seamlessly.
5.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
How does Encapsulating Security Payload (ESP) in transport mode affect in the Internet Protocol (IP)?
Authenticates the IP payload and selected portions of the IP header
Encrypts and optionally authenticates the complete IP packet
Encrypts and optionally authenticates the IP header, but not the IP payload
Encrypts and optionally authenticates the IP payload, but not the IP header
6.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Which of the following type of traffic can easily be filtered with a stateful packet filter by enforcing the context or state of the request?
ICMP
TCP
UDP
IP
7.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
When referring to the data structures of a packet, the term Protocol Data Unit (PDU) is used, what is the proper term to refer to a single unit of TCP data at the transport layer?
TCP Segment
TCP Datagram
TCP Frame
TCP Packet
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
16 questions
Photoshop tools
Quiz
•
6th Grade - Professio...
15 questions
Subnetting
Quiz
•
10th Grade - Professi...
15 questions
Data Science
Quiz
•
Professional Development
16 questions
U.T. 2: Capa de transporte
Quiz
•
Professional Development
20 questions
js DOM
Quiz
•
12th Grade - Professi...
15 questions
U.T. 4: Nivel de enlace - Subcapas LLC y MAC - ARP
Quiz
•
Professional Development
15 questions
Sensibilisation sécurité informatique
Quiz
•
Professional Development
15 questions
Javascript basics
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
12 questions
Unit 5: Puerto Rico W1
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
15 questions
Balance Equations Hangers
Quiz
•
Professional Development
31 questions
Servsafe Food Manager Practice Test 2021- Part 1
Quiz
•
9th Grade - Professio...