Chapter 4Communication and Network Security (Domain 4)

  1. Gary wants to distribute a large file and prefers a peer-to-peer CDN. Which of the following is the most common example of this type of technology?
    1. CloudFlare
    2. BitTorrent
    3. Amazon CloudFront
    4. Akamai Edge
  2. During a security assessment of a wireless network, Jim discovers that LEAP is in use on a network using WPA. What recommendation should Jim make?
    1. Continue to use LEAP. It provides better security than TKIP for WPA networks.
    2. Use an alternate protocol like PEAP or EAP-TLS and implement WPA2 if supported. ...

Get (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.