100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten
logo-home
CISSP Study Guide Exam Questions (1,120 terms) with Answers Updated . Terms like; Message Handling Services - Answer: X.400 Directory Services - Answer: X.500 How does S-HTTP encrypt? - Answer: S-HTTP encrypts Individual messages. €2,93
In winkelwagen

Tentamen (uitwerkingen)

CISSP Study Guide Exam Questions (1,120 terms) with Answers Updated . Terms like; Message Handling Services - Answer: X.400 Directory Services - Answer: X.500 How does S-HTTP encrypt? - Answer: S-HTTP encrypts Individual messages.

 5 keer verkocht
  • Vak
  • CISSP Study Guie Exa Qutions wit
  • Instelling
  • CISSP Study Guie Exa Qutions Wit

CISSP Study Guide Exam Questions (1,120 terms) with Answers Updated . Terms like; Message Handling Services - Answer: X.400 Directory Services - Answer: X.500 How does S-HTTP encrypt? - Answer: S-HTTP encrypts Individual messages.

Voorbeeld 4 van de 111  pagina's

  • 6 januari 2024
  • 111
  • 2023/2024
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • CISSP Study Guie Exa Qutions wit
  • CISSP Study Guie Exa Qutions wit
avatar-seller
CISSP+ (Q&A)




CISSP Study Guide Exam Questions
(1,120 terms) with Answers Updated
2023-2024.
Message Handling Services - Answer: X.400



Directory Services - Answer: X.500



How does S-HTTP encrypt? - Answer: S-HTTP encrypts Individual messages.



How does HTTPS encrypt? - Answer: HTTPS encrypts the entire comm channel using TLS.



At what OSI layer is a Segment found? - Answer: Segments are found at the Transport Layer.

, CISSP+ (Q&A)


At what layer of the OSI model are Packets found? - Answer: Packets are found at the Network Layer.



At what layer of the OSI model are Frames found? - Answer: Frames are found at the Data Link Layer.



At what layer of the OSI model are Bits found? - Answer: Bits are found at Layer 1: the Physical Layer.



At what OSI layers are Data Streams found? - Answer: Data Streams are found At the top 3 layers of the
OSI model: Session, Presentation and Application.



In IPv6, what kind of address is designated ::1? - Answer: ::1 is the IPv6 loopback address, equivalent to
127.0.0.1 in IPv4



What kind of IPv6 address begins with the hextet FF01? - Answer: FF01 is the first hextet of an IPv6
multicast address.



What does the prefix IPv6 hextet FEC0 designate? - Answer: FEC0 is the first hextet of an IPv6 site-local
address or SLA, equivalent to IPv4 private addresses. RFC 3879 degrades IPv6 site-local addresses in
favor of the *locally assigned* unique local addresses, or ULA.



What kind of IPv6 address begins with the hextet FE80? - Answer: FE80 is the first hextet of an IPv6 link-
local address: equivalent to an IPv4 APIPA address.



What does the IPv6 prefix FC00 designate? - Answer: FC00 is the first hextet of an IPv6 centrally-assigned
unique local address or ULA.



What does the IPv6 prefix FD00 designate? - Answer: FD00 is the first hextet of an IPv6 *locally-
configured* unique local address or ULA



What kind of IPv6 addresses begin with 2000, 2001, 2002, 2003, etc.? - Answer: IPv6 global unicast
address. These are equivalent to unique public IPv4 routable addresses.

, CISSP+ (Q&A)


Which mode of ESP encrypts only the data payload? - Answer: ESP Transport Mode encrypts only the
data payload.



Which mode of ESP encrypts the entire packet? - Answer: ESP Tunnel Mode encrypts the entire packet.



Which ports are identified as the System/Well-Known Ports? - Answer: Ports 0-1023.



Which ports are identified as the Registered/User Ports? - Answer: Ports 1024-49151.



Which ports are identified as the Dynamic/Private/Ephemeral Ports? - Answer: Ports 49152-65535.



Is T1 Packet, Circuit or Cell Switched? - Answer: Circuit Switched



Is Frame Relay Packet, Circuit or Cell Switched? - Answer: Packet Switched



Is ATM Packet, Circuit or Cell Switched? - Answer: Cell Switched: 53 bytes



How do you create ciphertext in binary? - Answer: To create ciphertext in binary, XOR the original
plaintext with the generated keystream.



How do you compute XOR on two bits? - Answer: if only one of the values is true, then the result is true.
Otherwise, false.



What is it called when a biometric system grants access to an unauthorized person? - Answer: When a
biometric system grants access to an unauthorized person, that is known as a False Positive, or a Type 1
Biometric Error.



What is it called when a biometric system denies access to an authorized person? - Answer: When a
biometric system denies access to an authorized person, that is known as a False Negative, or a Type 2
Biometric Error.

, CISSP+ (Q&A)


What is IEE 802.11? - Answer: IEEE 802.11 is WiFi.



What is IEEE 802.15? - Answer: IEEE 802.15 is Bluetooth.



What is IEEE 802.16? - Answer: WiMax - cellphone broadband using microwave towers. It is an acronym
standing for *"Worldwide Interoperability for Microwave Access".*



What is IEEE 802.20? - Answer: IEEE 802.20 is mobile broadband on cellphones also known as MBWA
(Mobile Broadband Wireless Access).



What electronic devices and WiFi standards run in the 2.4 GHz range? - Answer: Bluetooth, microwaves,
some older wireless phones as well as wireless standards b, g, and n all run in the 2.4GHz range. Unlike
the others in this list, wireless n also has the option of running at 5GHz.



Whch wireless standards use the 5 GHz band? - Answer: 5 GHz is the frequency band in which wireless a,
optionally n, and ac run.



Which wireless standard can run in both the 2.4GHz and 5GHz frequency bands? - Answer: Wireless n
can run in both the 2.4GHz and the 5GHz frequency bands.



What avoidance technology is built into WiFi standard 802.11a? - Answer: Wireless a is the WiFi
standard with RADAR (Radio Detection and Ranging) avoidance technology built in to it.



What does MIMO stand for? - Answer: MIMO is an acronym which stands for Multiple Input, Multiple
Output. It is a technology which employs multiple transmitters and receiver antennae to increase data
throughput. MIMO was Introduced with wireless n.



What is Diversity in wireless networking? - Answer: Diversity is a method for improving the *reliability*
of a WiFi transmission by using two or more communication channels.



What is Channel Bonding? - Answer: Channel bonding is a feature in 802.11n that allows for the use of
multiple simultaneous frequencies to increase usable bandwidth.

Dit zijn jouw voordelen als je samenvattingen koopt bij Stuvia:

Bewezen kwaliteit door reviews

Bewezen kwaliteit door reviews

Studenten hebben al meer dan 850.000 samenvattingen beoordeeld. Zo weet jij zeker dat je de beste keuze maakt!

In een paar klikken geregeld

In een paar klikken geregeld

Geen gedoe — betaal gewoon eenmalig met iDeal, creditcard of je Stuvia-tegoed en je bent klaar. Geen abonnement nodig.

Direct to-the-point

Direct to-the-point

Studenten maken samenvattingen voor studenten. Dat betekent: actuele inhoud waar jij écht wat aan hebt. Geen overbodige details!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper docmickey. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €2,93. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 68175 samenvattingen verkocht

Opgericht in 2010, al 15 jaar dé plek om samenvattingen te kopen

Begin nu gratis
€2,93  5x  verkocht
  • (0)
In winkelwagen
Toegevoegd