ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 105

Question list
Search
Search

List of questions

Search

Two remote offices need to be connected securely over an untrustworthy MAN. Each office needs to access network shares at the other site. Which of the following will BEST provide this functionality?

A.
Client-to-site VPN
A.
Client-to-site VPN
Answers
B.
Third-party VPN service
B.
Third-party VPN service
Answers
C.
Site-to-site VPN
C.
Site-to-site VPN
Answers
D.
Split-tunnel VPN
D.
Split-tunnel VPN
Answers
Suggested answer: C

An IT technician suspects a break in one of the uplinks that provides connectivity to the core switch.

Which of the following command-line tools should the technician use to determine where the incident is occurring?

A.
nslookup
A.
nslookup
Answers
B.
show config
B.
show config
Answers
C.
netstat
C.
netstat
Answers
D.
show interface
D.
show interface
Answers
E.
show counters
E.
show counters
Answers
Suggested answer: D

Which of the following needs to be tested to achieve a Cat 6a certification for a company's data cabling?

A.
RJ11
A.
RJ11
Answers
B.
LC ports
B.
LC ports
Answers
C.
Patch panel
C.
Patch panel
Answers
D.
F-type connector
D.
F-type connector
Answers
Suggested answer: C

A technician is troubleshooting a client's report about poor wireless performance. Using a client monitor, the technician notes the following information:

Which of the following is MOST likely the cause of the issue?

A.
Channel overlap
A.
Channel overlap
Answers
B.
Poor signal
B.
Poor signal
Answers
C.
Incorrect power settings
C.
Incorrect power settings
Answers
D.
Wrong antenna type
D.
Wrong antenna type
Answers
Suggested answer: A

Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?

A.
Layer 3 switch
A.
Layer 3 switch
Answers
B.
VPN headend
B.
VPN headend
Answers
C.
Next-generation firewall
C.
Next-generation firewall
Answers
D.
Proxy server
D.
Proxy server
Answers
E.
Intrusion prevention
E.
Intrusion prevention
Answers
Suggested answer: C

A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?

A.
Virtual network computing
A.
Virtual network computing
Answers
B.
Secure Socket Shell
B.
Secure Socket Shell
Answers
C.
in-band connection
C.
in-band connection
Answers
D.
Site-to-site VPN
D.
Site-to-site VPN
Answers
Suggested answer: D

Which of the following types of datacenter architectures will MOST likely be used in a large SDN and can be extended beyond the datacenter?

A.
iSCSI
A.
iSCSI
Answers
B.
FCoE
B.
FCoE
Answers
C.
Three-tiered network
C.
Three-tiered network
Answers
D.
Spine and leaf
D.
Spine and leaf
Answers
E.
Top-of-rack switching
E.
Top-of-rack switching
Answers
Suggested answer: B

At the destination host, which of the following OSI model layers will discard a segment with a bad checksum in the UDP header?

A.
Network
A.
Network
Answers
B.
Data link
B.
Data link
Answers
C.
Transport
C.
Transport
Answers
D.
Session
D.
Session
Answers
Suggested answer: C

A network administrator is configuring a database server and would like to ensure the database engine is listening on a certain port. Which of the following commands should the administrator use to accomplish this goal?

A.
nslookup
A.
nslookup
Answers
B.
netstat -a
B.
netstat -a
Answers
C.
ipeonfig /a
C.
ipeonfig /a
Answers
D.
arp -a
D.
arp -a
Answers
Suggested answer: B

Which of the following routing protocols is used to exchange route information between public autonomous systems?

A.
OSPF
A.
OSPF
Answers
B.
BGP
B.
BGP
Answers
C.
EIGRP
C.
EIGRP
Answers
D.
RIP
D.
RIP
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149