Page 855 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 855
B. DMZ
C. Extranet
D. VPN
6. What is a field-powered technology that can be used for inventory
management without requiring direct physical contact?
A. IPX
B. RFID
C. SSID
D. SDN
7. If you are the victim of a bluejacking attack, what was
compromised?
A. Your firewall
B. Your switch
C. Your cell phone
D. Your web cookies
8. Which networking technology is based on the IEEE 802.3
standard?
A. Ethernet
B. Token Ring
C. FDDI
D. HDLC
9. What is a TCP wrapper?
A. An encapsulation protocol used by switches
B. An application that can serve as a basic firewall by restricting
access based on user IDs or system IDs
C. A security protocol used to protect TCP/IP traffic over WAN
links
D. A mechanism to tunnel TCP/IP through non-IP networks

