当前位置:网站首页>Daily CISSP certification common mistakes (April 19, 2022)

Daily CISSP certification common mistakes (April 19, 2022)

2022-04-23 18:18:00 Tang Junfei - Mingxue Online

CISSP Certification is often wrong ( From Mingxue online test platform :https://www.maxstu.com/page/1773704)

【 The answer is analyzed after the question 】


subject 1
Q:Andrea Want to ensure virtualized network security between virtualized environments . She uses virtual machine clusters in multiple locations in her state , And use third-party Internet service providers between these locations . If she runs flattening between these positions 2 Layer of the network , Which of the following solutions is best suited to protect her traffic ?
Andrea wants to ensure that her virtualized networks are secure between virtual environments. She uses virtual machine clusters in multiple locations in her state with third-party internet service providers between those locations. Which of the following solutions is best suited to protecting her traffic if she runs a flattened layer 2 network between those locations?
A、TLS 
B、BGP 
C、IPsec
D、AES

subject 2
Q:Henry Our company has deployed a wide range of Internet of things infrastructure , For building monitoring , This includes environmental control 、 Occupancy sensors and various other sensors and controllers that help manage the building .Henry When analyzing the deployment of the Internet of things , Which of the following safety issues should be reported as the most critical ?
Henry's company has deployed an extensive IoT infrastructure for building monitoring that includes environmental controls, occupancy sensors, and a variety of other sensors and controllers that help manage the building. Which of the following security concerns should Henry report as the most critical in his analysis of the IoT deployment?
A、IoT The local storage space of common security logs of the device is insufficient
The lack of local storage space for security logs that is common to IoT devices.
B、IoT The device may not have a separate management interface , Allow anyone on the same network to try to log in , This makes violent attacks possible
The IoT devices may not have a separate administrative interface, allowing anybody on the same network to attempt to log into them and making brute-force attacks possible.
C、IoT The device may not support strong encrypted communication , Expose log and sensor data to the network and be intercepted
The IoT devices may not support strong encryption for communications, exposing the log and sensor data to interception on the network.
D、IoT The long-term support and repair model of equipment may bring security and operational risks to the organization
The long-term support and patching model for the IoT devices may create security and operational risk for the organization.

subject 3
Q:Jill Is purchasing new network hardware for her organization . She found a gray market supplier who imported hardware from abroad at a lower price . What is the most important security issue of the hardware obtained in this way ?
Jill is working to procure new network hardware for her organization. She finds a gray market supplier that is importing the hardware from outside the country at a much lower price. What security concern is the most significant for hardware acquired this way?
A、 Security of hardware and firmware
The security of the hardware and firmware
B、 Availability of hardware and software support
Availability of support for the hardware and software
C、 Whether the hardware is the legal product of the actual supplier
Whether the hardware is a legitimate product of the actual vendor
D、 Age of hardware
The age of the hardware
---------------


There are more free network security tests and online tests , as well as 2022 Wechat learning discussion group , If necessary, you can add Mingxue online assistant vx:2711252101, Get and join the group .

---------------
subject 1
answer :C
analysis :IPsec VPN Will allow Andrea Keep her network as... When necessary 2 Layer flattened network operation , And provide security for the traffic she wants .TLS Run at a higher network layer , Although the flow can be transmitted through the tunnel .BGP It's a routing protocol ,AES It's encryption algorithm .
An IPsec VPN will allow Andrea to keep her networks running as layer 2 flattened networks when necessary while providing the security for her traffic that she wants. TLS operates at a higher network layer, although traffic could be tunneled through it. BGP is a routing protocol, and AES is an encryption algorithm.

subject 2
answer :D
analysis :Henry The most concern should be the long-term security and supportability of Internet of things devices . As these devices are increasingly embedded in buildings and infrastructure , It is important to understand the support model and the security model . It can be done by putting IoT The device is placed on a private subnet or network that prevents other users from directly accessing the device , To solve the problems of lack of separate administrative access rights and lack of strong encryption . This will help limit the risk , Without unnecessary cost or complexity , And it's a common practice . Last , Lack of storage space can be a problem , But when considering the possible risks of Internet of things devices , This is not the most important .
Henry's biggest concern should be the long-term security and supportability of the IoT devices. As these devices are increasingly embedded in buildings and infrastructure, the support model and security model are important to understand. Both the lack of separate administrative access and the lack of strong encryption can be addressed by placing the IoT devices on a dedicated subnet or network that prevents other users from accessing the devices directly. This will help limit the risk without undue expense or complexity and is a common practice. Finally, lack of storage space can be a concern, but is not the most important when looking at the risks IoT devices can create.

subject 3
answer :A
analysis : Each of these answers can be a question , But the most important security issue is whether the hardware and firmware can be trusted or may have been modified . Original equipment manufacturer (OEM) There are commercial reasons to ensure the safety of its products , But third parties in the supply chain may not feel the same pressure . The availability of support and the legality of hardware are also issues , But it's not a direct security issue . Last , The hardware may be older than expected , Or maybe it's used 、 Refurbished or not new .
Each of these answers may be a concern, but the overriding security concern is if the hardware and firmware can be trusted or may have been modified. Original equipment manufacturers (OEMs) have business reasons to ensure the security of their product, but third parties in the supply chain may not feel the same pressure. Both availability of support and whether the hardware is legitimate are also concerns, but less immediate security concerns. Finally, hardware may be older than expected, or may be used, refurbished, or other- wise not new.

版权声明
本文为[Tang Junfei - Mingxue Online]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204210610263282.html