Senin, 30 Juni 2014

CISSP Exam Preparation (Question 236)

(236) Which choice below BEST describes a power sag?
A. Complete loss of power
B. Momentary low voltage
C. Prolonged high voltage
D. Momentary high voltage
Explanation:
Answer “Complete loss of power” is a blackout, answer “Momentary high volta ” is a spike,
and answer “Prolonged high voltage” is a surge.

- Idham Azhari

Jumat, 20 Juni 2014

CISSP Exam Preparation (Question 235)

(235) Which type of fire extinguisher below should be used on an electrical fire?
A. Soda Acid
B. CO2
C. Kerosene
D. Water
Explanation:
The most common electrical fire suppression mediums for an electrical or electronic fire are CO2, Halon , and its substitutes, including several inert gas agents.

- Idham Azhari

Kamis, 19 Juni 2014

CISSP Exam Preparation (Question 234)

(234) On June 30, 2000, the U.S. Congress enacted the Electronic Signatures in Global and National Commerce Act (ESIGN) to facilitate the use of electronic records and signatures in interstate and foreign commerce byensuring the validity and legal effect of contracts entered into electronically. An important provision of the Act requires that:
A. The e-commerce businesses do not have to determine whether the  consumer has the ability to receive an electronic notice before  transmitting the legally required notices to the consumer.
B. Businesses have the ability to use product price to persuade  consumers to accept electronic records instead of paper.
C. Specific technologies be used to ensure technical compatibility.
D. Businesses obtain electronic consent or confirmation from consumers to receive information electronically that a law normally requires to be in writing.


Explanation:
The legislation is intent on preserving the consumers rights
 under consumer protection laws and went to extraordinary measures to meet this goal. Thus, a business must receive confirmation from the consumer in electronic format that the consumer consents to receiving information electronically that used to be in written form. This provision ensures that the consumer has access to the Internet and is familiar with the basics of electronic communications. Answer b is, therefore, incorrect. Answer c is also incorrect since the legislation reduces the ability of businesses to use product price unfairly to persuade consumers to accept electronic records. Answer d is incorrect since the legislation is specifically technology-neutral to permit the use of the best technology for the
application.

- Idham Azhari

Rabu, 18 Juni 2014

CISSP Exam Preparation (Question 233)

(233) Which is NOT considered a preventative security measure?
A. Preset locks
B. Guards
C. Fences
D. Audit trails


Explanation:
Audit trails are detective, rather than preventative, because they are used to piece together the information of
 an intrusion or intrusion attempt after the fact.

- Idham Azhari

Selasa, 17 Juni 2014

CISSP Exam Preparation (Question 232)

(232) Which is NOT a PC security control device?
A. A cable lock
B. A switch control
C. A port control
D. A file cabinet lock


Explanation:
A cable lock is used to attach the PC to a
 desk; a switch control is used to prevent powering off of a unit; and a port control (such as a diskette drive lock) is used to prevent data from being downloaded from the PC.

- Idham Azhari

Senin, 16 Juni 2014

CISSP Exam Preparation (Question 231)

(231) An IP spoofing attack can be best classified as a:
A. Session hijacking attack
B. Passive attack
C. Fragmentation attack
D. Sniffing attack
Explanation:
IP spoofing attempts to convince a system that it is communicating with a known entity, thus giving an intruder access. This is a type of session hijacking attack.

- Idham Azhari

Jumat, 13 Juni 2014

CISSP Exam Preparation (Question 230)

(230) Of the following authentication mechanisms, which creates a problem for mobile users?
A. Address-based mechanism
B. Reusable password mechanism
C. One-time password mechanism
D. Challenge-response mechanism
Explanation:
The address-based mechanism is used for establishing connections, not authentication. This leaves mobile users open to vulnerabilities.

- Idham Azhari

Kamis, 12 Juni 2014

CISSP Exam Preparation (Question 229)

(229) What kind of attacks are the lower layers (Physical, Link, Network, Transport) unable to protect against?
A. Piggyback
B. Brute force
C. Denial of service
D. Content-based

Explanation:
Lower layer protocols do not interact with data contained in the payload.

- Idham Azhari

Rabu, 11 Juni 2014

CISSP Exam Preparation (Question 228)

(228) Which of the following layers deals with Media Access Control (MAC) addresses?
A. Data Link layer
B. Physical layer
C. Transport layer
D. Network layer
Explanation:
The Data Link layer (Layer 2) transfers information to the other end of the Physical link. It handles physical addressing, network topology, error notification, delivery of frames, and flow control.

- Idham Azhari

Selasa, 10 Juni 2014

CISSP Exam Preparation (Question 227)

(227) To obtain an IP address from a MAC address, what mechanism is used?
A. Reverse Address Resolution Protocol (RARP)
B. Address Resolution Protocol (ARP)
C. Data Link layer
D. Network Address Translation (NAT)
Explanation:
The Reverse Address Resolution Protocol (RARP) sends out a packet that includes a MAC address and a request to be informed of the IP address that should be assigned to that MAC. Diskless workstations that need to obtain their IP address from the network may use this process.

- Idham Azhari

Senin, 09 Juni 2014

CISSP Exam Preparation (Question 226)

(226) LAN devices that typically examine the entire packet are called:
A. Routers
B. Brouters
C. Switches
D. Gateways

Explanation:
Gateways are primarily software products that can be run on computers
 or other network devices. They can link different protocols and examine the entire packet.

- Idham Azhari