O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Sample questions

Q1. Spoofing is a type of:

  1. Vulnerability
  2. Masquerading
  3. Protocol
  4. Layer in a TCP/IP model

Q2. An attack is a:

  1. Threat
  2. Vulnerability
  3. Technique
  4. Protocol

Q3. Transport layer security and secure sockets layer are not:

  1. Protocols
  2. Cryptographic algorithms
  3. Vulnerabilities
  4. Use encryption

Q4. Replay attacks are used to:

  1. Gain unauthorized access to the application systems
  2. Resolve domain names
  3. Break cryptographic keys
  4. Setup secure connections

Q5. Internet Protocol (IP) operates in:

  1. Physical layer
  2. Network layer
  3. Application layer
  4. Communication layer

Q6. Border Gateway Protocol is a:

  1. Physical layer protocol
  2. Address Resolution Protocol
  3. Routing Protocol
  4. LAN technology

Q7. Multi Protocol Label Switching (MPLS) is often referred to as:

  1. Application Layer Protocol
  2. Layer 2.5 protocol ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required