Exam 3: Telecommunications and Network Security
Exam 1: The Cissp Exam10 Questions
Exam 2: Access Control20 Questions
Exam 3: Telecommunications and Network Security19 Questions
Exam 4: Information Security Governance and Risk Management20 Questions
Exam 5: Software Development Security20 Questions
Exam 6: Cryptography20 Questions
Exam 7: Security Architecture and Design20 Questions
Exam 8: Operations Security19 Questions
Exam 9: Business Continuity and Disaster Recovery20 Questions
Exam 10: Legal, Regulations, Investigations, and Compliance20 Questions
Exam 11: Physical Environmental Security20 Questions
Select questions type
At which layer of the OSI model does the encapsulation process begin?
Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
A
Which attack takes advantage of the TCP three-way handshake?
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
B
How many channels are contained in a T1?
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
D
Which of the following represents the range of well-known port numbers?
(Multiple Choice)
4.9/5
(31)
A Metropolitan-area network (MAN) is a type of LAN that encompasses a large area such as the downtown of a city.
(True/False)
4.8/5
(38)
To deploy DNSSEC, a Public Key Infrastructure (PKI) must be built.
(True/False)
4.8/5
(31)
Wired Equivalent Privacy (WEP) was the first security measure used with 802.11.
(True/False)
4.9/5
(37)
The IP address 192.168.5.5 is a private IP address according to RFC 1918.
(True/False)
4.8/5
(43)
________________is the weakening of the signal as it travels down the cable and meets resistance.
(Multiple Choice)
4.8/5
(36)
What role does the access point play when using a RADIUS server?
(Multiple Choice)
4.8/5
(34)
Which cable type uses a source of light that shoots down an inner glass or plastic core?
(Multiple Choice)
4.7/5
(44)
Distance vector routing protocols use which of the following as its metric?
(Multiple Choice)
4.8/5
(43)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)