CISSP Exam Questions for Self-Study (Domain 4)
Note: Pardon the messiness of the questions. These questions come from my podcast and will be cleaning the questions up over the coming weeks.
Question:
What layer formats packets from the Network layer for transmission and is commonly using Point-to-Point Protocol and the Integrated Services Digital Network (ISDN)?
- Session
- Data Link
- Application
- Network
Explanation: [b] The data link layer is responsible for formatting packets from the Network Layer to be used in transmission of the data.
Question
What is layer 3 of the OSI Model?
- Transport
- Data Link
- Physical
- Network
Explanation: [d] The Network Layer is Layer 3 of the OSI model situated between the Data Link (Layer 2) and the Transport Layer (Layer 4)
QUESTION 1
Serve as a gateway between a trusted and untrusted network that gives limited, authorized access to untrusted hosts.
- Layer 6
- Traceroute
- Bridges
- Bastion hosts
CORRECT ANSWER - Bastion hosts
QUESTION 2
A basic network mapping technique that helps narrow the scope of an attack:
- Firewalls
- Voice over IP (VoIP)
- Ping scanning
- Bridges
CORRECT ANSWER - Bridges
QUESTION 3
Layering model structured into four layers (link layer, network layer, transport layer and application layer.
- Remote procedure calls (RPC)
- TCP/IP or Department of Defense (DoD) model
- Screen scraper
- Traceroute
CORRECT ANSWER - TCP/IP or Department of Defense (DoD) model
QUESTION 1
Provides connection-oriented data management and reliable data transfer:
- Traceroute
- Bastion hosts
- Decryption
- Transmission control protocol (TCP)
CORRECT ANSWER - Transmission control protocol (TCP)
QUESTION 2
Provides a lightweight service for connectionless data transfer without error detection and correction:
- Layer 3
- Layer 1
- Screen scraper
- User Datagram Protocol (UDP)
CORRECT ANSWER - User Datagram Protocol (UDP)
QUESTION 3
A virtual private network (VPN) is an encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network
- True
- False
CORRECT ANSWER - True
QUESTION 1
OSI reference model is a layering model structured into seven layers (physical layer, data-link layer, network layer, transport layer, session layer, presentation layer, application layer).
- True
- False
CORRECT ANSWER - True
QUESTION 2
Firewalls as devices that enforce administrative security policies by filtering incoming traffic based on a set of rules.
- True
- False
CORRECT ANSWER - True
QUESTION 3
Fibre Channel over Ethernet (FCoE) is a stateful protocol that requires two communication channels.
- True
- False
YOUR ANSWER - undefined
CORRECT ANSWER - False
QUESTION 4
Transmission Control Protocol (TCP) provides connection-oriented data management and reliable data transfer.
- True
- False
CORRECT ANSWER - True