
CISSP Domain 4
Authored by Miftah Rahman
Computers
Professional Development
Used 21+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Which of the following best describes the role of a Bastion Host in network security architecture?
A highly secured computer designed to withstand attacks and provide controlled access to internal systems
A server placed in a DMZ that typically runs proxy or gateway services for external users.
Any host that has been hardened with security patches and minimal services to reduce its attack surface.
A network device that acts as an intermediary between external networks and protected internal resources.
2.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A financial company receives multiple phishing emails that appear to come from its official domain. The emails are sent from unauthorized mail servers, and some of them have been altered during transmission. The company wants to ensure that:
1. Only legitimate mail servers can send emails on behalf of the domain.
2. The integrity of the message is preserved so recipients know it has not been tampered with.
3. Clear policies are enforced so receiving mail servers can reject or quarantine fraudulent emails.
Which combination of technologies should the company implement to achieve these goals?
Use SPF to restrict authorized senders, DKIM for message integrity, and DMARC for policy enforcement.
Use SPF to encrypt emails, DKIM to authenticate users, and DMARC to provide end-to-end encryption.
Use DMARC to filter spam, SPF to provide confidentiality, and DKIM to hide sensitive data.
Use TLS for authentication, SPF for data integrity, and DMARC for message encryption.
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
What does a Synchronous (SYN) flood attack do?
Forces Transmission Control Protocol /Internet Protocol (TCP/IP) connections into a reset state
Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections
Empties the queue of pending Transmission Control Protocol /Internet Protocol (TCP/IP) requests
Exceeds the limits for new Transmission Control Protocol /Internet Protocol (TCP/IP) connections
4.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
In a High Availability (HA) environment, what is the PRIMARY goal of working with a virtual router address as the gateway to a network?
The second of two routers can periodically check in to make sure that the first router is operational.
The second of two routers can better absorb a Denial of Service (DoS) attack knowing the first router is present.
The first of two routers fails and is reinstalled, while the second handles the traffic flawlessly.
The first of two routers can better handle specific traffic, while the second handles the rest of the traffic seamlessly.
5.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
How does Encapsulating Security Payload (ESP) in transport mode affect in the Internet Protocol (IP)?
Authenticates the IP payload and selected portions of the IP header
Encrypts and optionally authenticates the complete IP packet
Encrypts and optionally authenticates the IP header, but not the IP payload
Encrypts and optionally authenticates the IP payload, but not the IP header
6.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Which of the following type of traffic can easily be filtered with a stateful packet filter by enforcing the context or state of the request?
ICMP
TCP
UDP
IP
7.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
When referring to the data structures of a packet, the term Protocol Data Unit (PDU) is used, what is the proper term to refer to a single unit of TCP data at the transport layer?
TCP Segment
TCP Datagram
TCP Frame
TCP Packet
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
18 questions
CIW IBA Lesson 5 Vocabulary
Quiz
•
8th Grade - Professio...
15 questions
CodeHS - Intro to Python - Conditionals Quiz
Quiz
•
9th Grade - Professio...
15 questions
Network Plus Pre Assessment
Quiz
•
Professional Development
20 questions
class 8
Quiz
•
Professional Development
20 questions
แบบทดสอบไมโครคอนโทรลเลอร์ (Microcontroller)
Quiz
•
Professional Development
20 questions
Mobile Apps PayKu
Quiz
•
1st Grade - Professio...
20 questions
Javascript Fundamental Practice
Quiz
•
Professional Development
20 questions
MS Office
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L3_22-23
Lesson
•
KG - Professional Dev...
20 questions
Employability Skills
Quiz
•
Professional Development