![Reduce Cyber Risk Podcast artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts113/v4/b4/0c/8b/b40c8be3-5be6-580e-d06b-465f73bb8141/mza_9221924626890373133.png/100x100bb.jpg)
RCR 070: CISSP Sample Exam Questions - CISSP Training and Study!
Reduce Cyber Risk Podcast
English - February 15, 2020 23:00 - 6 minutes - 9.67 MB - ★★★★★ - 16 ratingsTechnology Business cybersecurity cissp cybersecuritycourse cybersecurityforbeginners cybersecurityfundamentals cybersecuritynews cybersecuritytraining isc2 itsecurity learncybersecurityfree Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Subscribe: iTunes | Goggle Play | Stitcher Radio | RSS
Description:
Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity.
In this episode, Shon will provide CISSP training for Domain 4 (Communication and Network Security) of the CISSP Exam. His extensive training will cover all of the CISSP domains.
BTW - Get access to all my CISSP Training Courses here at: https://shongerber.com/
CISSP Exam Questions
Question: 093
________ is a standards-based mechanism for providing encryption for point-to-point TCP/IP traffic.
A) UDP B) IDEA C) IPSec D) SDLCIPSec
IPSec, or IP Security, is a standards-based mechanism for providing encryption for point-to-point TCP/IP traffic.
From https://www.brainscape.com/flashcards/telecommunications-and-network-security-971259/packs/1774328
------------------------------------
Question: 094
What is both a benefit and a potentially harmful implication of multilayer protocols?
A) Throughput B) Encapsulation C) Hash integrity checking D) Logical addressingEncapsulation
Encapsulation is both a benefit and a potentially harmful implication of multilayer protocols.
From https://www.brainscape.com/flashcards/telecommunications-and-network-security-971259/packs/1774328
------------------------------------
Question: 095
Which of the following is not true regarding firewalls?
A) They are able to log traffic information. B) They are able to block viruses. C) They are able to issue alarms based on suspected attacks. D) They are unable to prevent internal attacks.They are able to block viruses.
Most firewalls offer extensive logging, auditing, and monitoring capabilities as well as alarms and even basic IDS functions. Firewalls are unable to block viruses or malicious code transmitted through otherwise authorized communication channels, prevent unauthorized but accidental or intended disclosure of information by users, prevent attacks by malicious users already behind the firewall, or protect data after it passed out of or into the private network.
From https://www.brainscape.com/flashcards/telecommunications-and-network-security-971259/packs/1774328
------------------------------------
Want to find Shon elsewhere on the internet?
LinkedIn – www.linkedin.com/in/shongerber
Facebook - https://www.facebook.com/CyberRiskReduced/
LINKS:
ISC2 Training Study Guide https://www.isc2.org/Training/Self-Study-Resources