Page 855 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 855

B.  DMZ

                    C.  Extranet


                    D.  VPN
                6.  What is a field-powered technology that can be used for inventory

                    management without requiring direct physical contact?

                    A.  IPX

                    B.  RFID

                    C.  SSID

                    D.  SDN

                7.  If you are the victim of a bluejacking attack, what was
                    compromised?

                    A.  Your firewall

                    B.  Your switch


                    C.  Your cell phone

                    D.  Your web cookies

                8.  Which networking technology is based on the IEEE 802.3
                    standard?

                    A.  Ethernet

                    B.  Token Ring

                    C.  FDDI

                    D.  HDLC

                9.  What is a TCP wrapper?

                    A.  An encapsulation protocol used by switches


                    B.  An application that can serve as a basic firewall by restricting
                        access based on user IDs or system IDs

                    C.  A security protocol used to protect TCP/IP traffic over WAN
                        links

                    D.  A mechanism to tunnel TCP/IP through non-IP networks
   850   851   852   853   854   855   856   857   858   859   860