Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
CISSP in 21 Days

You're reading from   CISSP in 21 Days Boost your confidence and get the competitive edge you need to crack the exam in just 21 days!

Arrow left icon
Product type Paperback
Published in Jun 2016
Publisher
ISBN-13 9781785884498
Length 402 pages
Edition 2nd Edition
Arrow right icon
Author (1):
Arrow left icon
M. L. Srinivasan M. L. Srinivasan
Author Profile Icon M. L. Srinivasan
M. L. Srinivasan
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Day 1 – Security and Risk Management - Security, Compliance, and Policies FREE CHAPTER 2. Day 2 – Security and Risk Management - Risk Management, Business Continuity, and Security Education 3. Day 3 – Asset Security - Information and Asset Classification 4. Day 4 – Asset Security - Data Security Controls and Handling 5. Day 5 – Exam Cram and Practice Questions 6. Day 6 – Security Engineering - Security Design, Practices, Models, and Vulnerability Mitigation 7. Day 7 – Security Engineering - Cryptography 8. Day 8 – Communication and Network Security - Network Security 9. Day 9 – Communication and Network Security - Communication Security 10. Day 10 – Exam Cram and Practice Questions 11. Day 11 – Identity and Access Management - Identity Management 12. Day 12 – Identity and Access Management - Access Management, Provisioning, and Attacks 13. Day 13 – Security Assessment and Testing - Designing, Performing Security Assessment, and Tests 14. Day 14 – Security Assessment and Testing - Controlling, Analyzing, Auditing, and Reporting 15. Day 15 – Exam Cram and Practice Questions 16. Day 16 – Security Operations - Foundational Concepts 17. Day 17 – Security Operations - Incident Management and Disaster Recovery 18. Day 18 – Software Development Security - Security in Software Development Life Cycle 19. Day 19 – Software Development Security - Assessing effectiveness of Software Security 20. Day 20 – Exam Cram and Practice Questions 21. Day 21 – Exam Cram and Mock Test

Sample questions


Q1. Spoofing is a type of:

  1. Vulnerability

  2. Masquerading

  3. Protocol

  4. Layer in a TCP/IP model

Q2. An attack is a:

  1. Threat

  2. Vulnerability

  3. Technique

  4. Protocol

Q3. Transport layer security and secure sockets layer are not:

  1. Protocols

  2. Cryptographic algorithms

  3. Vulnerabilities

  4. Use encryption

Q4. Replay attacks are used to:

  1. Gain unauthorized access to the application systems

  2. Resolve domain names

  3. Break cryptographic keys

  4. Setup secure connections

Q5. Internet Protocol (IP) operates in:

  1. Physical layer

  2. Network layer

  3. Application layer

  4. Communication layer

Q6. Border Gateway Protocol is a:

  1. Physical layer protocol

  2. Address Resolution Protocol

  3. Routing Protocol

  4. LAN technology

Q7. Multi Protocol Label Switching (MPLS) is often referred to as:

  1. Application Layer Protocol

  2. Layer 2.5 protocol

  3. Layer 3 protocol

  4. Layer 3.5 protocol

Q8. IPsec is a set of protocols that are used to secure Internet communications. Which of the following is not a key function of the protocol?

  1. Authentication

  2. Encryption

  3. Key exchange

  4. Key modification

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image