【计算机类职业资格】计算机CISSP认证-4及答案解析.doc
《【计算机类职业资格】计算机CISSP认证-4及答案解析.doc》由会员分享,可在线阅读,更多相关《【计算机类职业资格】计算机CISSP认证-4及答案解析.doc(25页珍藏版)》请在麦多课文档分享上搜索。
1、计算机 CISSP 认证-4 及答案解析(总分:100.00,做题时间:90 分钟)1.IP telephony networks require the same security measures as those implemented on an IP data network. Which of the following is unique to IP telephony?(分数:2.50)A.Limiting IP sessions going through media gatewaysB.Identification of rogue devicesC.Implementat
2、ion of authenticationD.Encryption of packets containing sensitive information2.Cross-site scripting (XSS) is an application security vulnerability usually found in Web applications. What type of XSS vulnerability occurs when a victim is tricked into opening a URL programmed with a rogue script to st
3、eal sensitive information?(分数:2.50)A.Persistent XSS vulnerabilityB.Nonpersistent XSS vulnerabilityC.Second-order vulnerabilityD.DOM-based vulnerability3.Angela wants to group together computers by department to make it easier for them to share network resources. Which of the following will allow her
4、 to group computers logically?(分数:2.50)A.VLANB.Open network architectureC.IntranetD.VAN4.Which of the following incorrectly describes how routing commonly takes place on the Internet?(分数:2.50)A.EGP is used in the areas “between“ each AS.B.Regions of nodes that share characteristics and behaviors are
5、 called ASs.C.CAs are specific nodes that are responsible for routing to nodes outside of their region.D.Each AS uses IGP to perform routing functionality.5.Both de facto and proprietary interior protocols are in use today. Which of the following is a proprietary interior protocol that chooses the b
6、est path between the source and destination?(分数:2.50)A.IGRPB.RIPC.BGPD.OSPF6.Which of the following categories of routing protocols builds a topology database of the network?(分数:2.50)A.DynamicB.Distance-vectorC.Link-stateD.Static7.Which of the following does not describe IP telephony security?(分数:2.
7、50)A.VoIP networks should be protected with the same security controls used on a data network.B.Softphones are more secure than IP phones.C.As endpoints, IP phones can become the target of attacks.D.The current Internet architecture over which voice is transmitted is less secure than physical phone
8、lines.8.When an organization splits naming zones, the names of its hosts that are only accessible from an intranet are hidden from the Internet. Which of the following best describes why this is done?(分数:2.50)A.To prevent attackers from accessing serversB.To prevent the manipulation of the hosts fil
9、eC.To avoid providing attackers with valuable information that can be used to prepare an attackD.To avoid providing attackers with information needed for cybersquatting9.Which of the following best describes why e-mail spoofing is easily executed?(分数:2.50)A.SMTP lacks an adequate authentication mech
10、anism.B.Administrators often forget to configure an SMTP server to prevent inbound SMTP connections for domains it doesn“t serve.C.Keyword filtering is technically obsolete.D.Blacklists are undependable.10.Which of the following is not a benefit of VoIP?(分数:2.50)A.CostB.ConvergenceC.FlexibilityD.Sec
11、urity11.Today, satellites are used to provide wireless connectivity between different locations. What two prerequisites are needed for two different locations to communicate via satellite links?(分数:2.50)A.They must be connected via a phone line and have access to a modem.B.They must be within the sa
12、tellite“s line of site and footprint.C.They must have broadband and a satellite in low Earth orbit.D.They must have a transponder and be within the satellite“s footprint.12.Brad is a security manager at Thingamabobs Inc. He is preparing a presentation for his company“s executives on the risks of usi
13、ng instant messaging (IM) and his reasons for wanting to prohibit its use on the company network. Which of the following should not be included in his presentation?(分数:2.50)A.Sensitive data and files can be transferred from system to system over IM.B.Users can receive informationincluding malwarefro
14、m an attacker posing as a legitimate sender.C.IM use can be stopped by simply blocking specific ports on the network firewalls.D.A security policy is needed specifying IM usage restrictions.13.There are several different types of authentication technologies. Which type is being shown in the graphic
15、that follows? (分数:2.50)A.802.1xB.Extensible Authentication ProtocolC.Frequency hopping spread spectrumD.Orthogonal frequency-division multiplexing14.What type of security encryption component is missing from the table that follows? (分数:2.50)A.Service Set IDB.Temporal Key Integrity ProtocolC.Ad hoc W
16、LAND.Open system authentication15.What type of technology is represented in the graphic that follows? (分数:2.50)A.Asynchronous Transfer ModeB.Synchronous Optical NetworksC.Frequency-division multiplexingD.Multiplexing16.What type of telecommunication technology is illustrated in the graphic that foll
17、ows? (分数:2.50)A.Digital Subscriber LineB.Integrated Services Digital NetworkC.BRI ISDND.Cable modem17.Which type of WAN tunneling protocol is missing from the table that follows? (分数:2.50)A.IPSecB.FDDIC.L2TPD.CSMA/CD18.IPv6 has many new and different characteristics and functionality compared to IPv
18、4. Which of the following is an incorrect functionality or characteristic of IPv6? . IPv6 allows for nonscoped addresses, which enables an administrator to restrict specific addresses for specific servers or file and print sharing, for example. . IPv6 has IPSec integrated into the protocol stack, wh
19、ich provides application-based secure transmission and authentication. . IPv6 has more flexibility and routing capabilities compared to IPv4 and allows for Quality of Service (QoS) priority values to be assigned to time sensitive transmissions. . The protocol offers auto configuration, which makes a
20、dministration much easier compared to IPv4, and it does not require network address translation (NAT) to extend its address space.(分数:2.50)A., B., C., D., 19.Hanna is a new security manager for a computer consulting company. She has found out that the company has lost intellectual property in the pa
21、st because malicious employees installed rogue devices on the network, which were used to capture sensitive traffic. Hanna needs to implement a solution that ensures only authorized devices are allowed access to the company network. Which of the following IEEE standards was developed for this type o
22、f protection?(分数:2.50)A.IEEE 802.1ARB.IEEE 802.1AEC.IEEE 802.1AFD.IEEE 802.1XR20.There are common cloud computing service models. _ usually requires companies to deploy their own operating systems, applications, and software onto the provided infrastructure, _ is the software environment that runs o
23、n top of the infrastructure. In the _ model the provider commonly gives the customers network-based access to a single copy of an application.(分数:2.50)A.Platform as a Service, Infrastructure as a Service, Software as a ServiceB.Platform as a Service, Platform as Software, Application as a ServiceC.I
24、nfrastructure as a Service, Application as a Service, Software as a ServiceD.Infrastructure as a Service, Platform as Software, Software as a Service21._ is a set of extensions to DNS that provides to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, sp
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 职业资格 CISSP 认证 答案 解析 DOC
