O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Sample questions

Q1. Media Access Control (MAC) is a:

  1. Addressing scheme
  2. Internet protocol
  3. Hardware model
  4. Network Interface card address

Q2. A protocol is a:

  1. Data Encryption Standard
  2. Layered architecture
  3. Communication standard
  4. Data link

Q3. Spoofing is a type of:

  1. Vulnerability
  2. Masquerading
  3. Protocol
  4. Layer in a TCP/IP model

Q4. The purpose of using Secure Shell (SSH) over TELNET is:

  1. SSH provides shell access to the target system
  2. SSH is faster than Telnet
  3. SSH encrypts the session and Telnet does not encrypt the session
  4. SSH is less expensive than Telnet

Q5. An attack is a:

  1. Threat
  2. Vulnerability
  3. Technique
  4. Protocol

Q6. Transport Layer Security and Secure Sockets Layer are not:

  1. Protocols
  2. Use cryptographic algorithms
  3. Vulnerability Use encryption

Q7. Replay attacks are used to:

  1. Gain ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required