CISSP®- The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 Revision 4

Interactive Video
•
Information Technology (IT), Architecture, Other
•
University
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was a primary reason IPV4 was not initially designed with security features?
There was no need for confidentiality.
It was meant for a closed network.
It was designed for wireless networks.
Security features were too expensive.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is PAP considered insecure?
Credentials are sent in plaintext.
It uses strong encryption.
It requires mutual authentication.
It is too complex to implement.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol uses a three-way handshake for authentication?
CHAP
EAP
PAP
VPN
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key feature of EAP-TLS?
It requires no certificates.
It uses public key infrastructure.
It is vulnerable to man-in-the-middle attacks.
It only supports client-side authentication.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which EAP variant is known for being weak and vulnerable to attacks?
EAP-TLS
PEAP
EAP-MD5
LEAP
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common use of VPNs?
To increase internet speed.
To access restricted content.
To reduce data usage.
To eliminate the need for passwords.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why are PPTP and L2TP not recommended for use today?
They are too fast for secure connections.
They require special hardware.
They lack built-in encryption.
They are too expensive.
Similar Resources on Wayground
6 questions
Describe a network protocol : What is a Network protocol?

Interactive video
•
University
8 questions
CompTIA Security+ Certification SY0-601: The Total Course - Identity Management Systems

Interactive video
•
University
5 questions
CompTIA Security+ Certification SY0-601: The Total Course - Virtual Private Networks (VPNs)

Interactive video
•
University
2 questions
How to secure your domain name services

Interactive video
•
University
6 questions
Design Microservices Architecture with Patterns and Principles - Design and Evaluate: Microservices Architecture with Se

Interactive video
•
University
8 questions
AZ-104: Microsoft Azure Administrator Full Course - Managing Linux Instances in Azure

Interactive video
•
University
6 questions
Active Directory with Windows Server 2016 - Introduction to Web App Proxy

Interactive video
•
University
6 questions
routing protocols : Classful routing protocols

Interactive video
•
University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Appointment Passes Review

Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
Grammar Review

Quiz
•
6th - 9th Grade
Discover more resources for Information Technology (IT)
15 questions
Disney Trivia

Quiz
•
University
21 questions
Spanish-Speaking Countries

Quiz
•
6th Grade - University
7 questions
What Is Narrative Writing?

Interactive video
•
4th Grade - University
20 questions
Disney Trivia

Quiz
•
University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
5 questions
Examining Theme

Interactive video
•
4th Grade - University
23 questions
Lab 4: Quizziz Questions

Quiz
•
University
12 questions
Los numeros en español.

Lesson
•
6th Grade - University