CISSP - Question Bank 02
Test your knowledge of CISSP with these multiple choice questions. Each Question Bank includes 20 practice questions that have been designed to measure your knowledge of key ideas.
A key factor to keep in mind is that guessing is better than not answering a question.
Every single question on the CISSP exam is a four-option multiple choice question with a single correct answer. Some are straightforward, such as asking you to select a definition. Some are a bit more involved, such as asking you to select the appropriate concept or best practice. And some questions present you with a scenario or situation and ask you to select the best response.
StartQ1. What is used to keep subjects accountable for their actions while they are authenticated to a system?
A. Access controls
B. Monitoring
C. Account lockout
D. Performance reviews
Q2. Which of the following tools is the most useful in sorting through large log files when searching for intrusion-related events?
A. Text editor
B. Vulnerability scanner
C. Password cracker
D. IDS
Q3. An intrusion detection system (IDS) is primarily designed to perform what function?
A. Detect abnormal activity
B. Detect system failures
C. Rate system performance
D. Test a system for vulnerabilities
Q4. IDSs are capable of detecting which type of abnormal or unauthorized activities? (Choose all that apply.)
A. External connection attempts
B. Execution of malicious code
C. Unauthorized access attempts to controlled objects
D. None of the above
Q5. Which of the following is true for a host-based IDS?
A. It monitors an entire network.
B. It monitors a single system.
C. It’s invisible to attackers and authorized users.
D. It’s ineffective on switched networks.
Q6. Which of the following types of IDS is effective only against known attack methods?
A. Host-based
B. Network-based
C. Knowledge-based
D. Behavior-based
Q7. Which type of IDS can be considered an expert system?
A. Host-based
B. Network-based
C. Knowledge-based
D. Behavior-based
Q8. Which of the following is a fake network designed to tempt intruders with unpatched and unprotected security vulnerabilities and false data?
A. IDS
B. Honey pot
C. Padded cell
D. Vulnerability scanner
Q9. When a padded cell is used by a network for protection from intruders, which of the following is true?
A. The data offered by the padded cell is what originally attracts the attacker.
B. Padded cells are a form of entrapment.
C. The intruder is seamlessly transitioned into the padded cell once they are detected.
D. Padded cells are used to test a system for known vulnerabilities.
Q10. Which of the following is true regarding vulnerability scanners?
A. They actively scan for intrusion attempts.
B. They serve as a form of enticement.
C. They locate known security holes.
D. They automatically reconfigure a system to a more secured state.
Q11. When using penetration testing to verify the strength of your security policy, which of the following is not recommended?
A. Mimicking attacks previously perpetrated against your system
B. Performing the attacks without managements consent
C. Using manual and automated attack tools
D. Reconfiguring the system to resolve any discovered vulnerabilities
Q12. Which of the following attacks is an attempt to test every possible combination against a security feature in order to bypass it?
A. Brute force attack
B. Spoofing attack
C. Man-in-the-middle attack
D. Denial of service attack
Q13. Which of the following is not a valid measure to take to improve protection against brute force and dictionary attacks?
A. Enforce strong passwords through a security policy.
B. Maintain strict control over physical access.
C. Require all users to log in remotely.
D. Use two-factor authentication.
Q14. Which of the following is not considered a denial of service attack?
A. Teardrop
B. Smurf
C. Ping of death
D. Spoofing
Q15. A SYN flood attack works by what mechanism?
A. Exploiting a packet processing glitch in Windows 95
B. Using an amplification network to flood a victim with packets
C. Exploiting the three-way handshake used by TCP/IP
D. Sending oversized ping packets to a victim
Q16. Which of the following attacks sends packets with the victim’s IP address as both the source and destination?
A. Land
B. Spamming
C. Teardrop
D. Stream
Q17. In what type of attack are packets sent to a victim using invalid resequencing numbers?
A. Stream
B. Spamming
C. Distributed denial of service
D. Teardrop
Q18. Spoofing is primarily used to perform what activity?
A. Send large amounts of data to a victim.
B. Cause a buffer overflow.
C. Hide the identity of an attacker through misdirection.
D. Steal user accounts and passwords.
Q19. Spamming attacks occur when numerous unsolicited messages are sent to a victim. Because enough data is sent to the victim to prevent legitimate activity, it is also known as what?
A. Sniffing
B. Denial of service
C. Brute force attack
D. Buffer overflow attack
Q20. What type of attack occurs when malicious users position themselves between a client and server and then interrupt the session and takes it over?
A. Man-in-the-middle
B. Spoofing
C. Hijack
D. Cracking
- Question Bank 00
- Question Bank 01
- Question Bank 02
- Question Bank 03
- Question Bank 04
- Question Bank 05
- Question Bank 06
- Question Bank 07
- Question Bank 08
- Question Bank 09
- Question Bank 10
- Question Bank 11
- Question Bank 12
- Question Bank 13
- Question Bank 14
- Question Bank 15
- Question Bank 16
- Question Bank 17
- Question Bank 18
- Question Bank 19