当前位置:网站首页>Daily CISSP certification common mistakes (April 19, 2022)
Daily CISSP certification common mistakes (April 19, 2022)
2022-04-23 18:18:00 【Tang Junfei - Mingxue Online】
CISSP Certification is often wrong ( From Mingxue online test platform :https://www.maxstu.com/page/1773704)
【 The answer is analyzed after the question 】
subject 1
Q:Andrea Want to ensure virtualized network security between virtualized environments . She uses virtual machine clusters in multiple locations in her state , And use third-party Internet service providers between these locations . If she runs flattening between these positions 2 Layer of the network , Which of the following solutions is best suited to protect her traffic ?
Andrea wants to ensure that her virtualized networks are secure between virtual environments. She uses virtual machine clusters in multiple locations in her state with third-party internet service providers between those locations. Which of the following solutions is best suited to protecting her traffic if she runs a flattened layer 2 network between those locations?
A、TLS
B、BGP
C、IPsec
D、AES
subject 2
Q:Henry Our company has deployed a wide range of Internet of things infrastructure , For building monitoring , This includes environmental control 、 Occupancy sensors and various other sensors and controllers that help manage the building .Henry When analyzing the deployment of the Internet of things , Which of the following safety issues should be reported as the most critical ?
Henry's company has deployed an extensive IoT infrastructure for building monitoring that includes environmental controls, occupancy sensors, and a variety of other sensors and controllers that help manage the building. Which of the following security concerns should Henry report as the most critical in his analysis of the IoT deployment?
A、IoT The local storage space of common security logs of the device is insufficient
The lack of local storage space for security logs that is common to IoT devices.
B、IoT The device may not have a separate management interface , Allow anyone on the same network to try to log in , This makes violent attacks possible
The IoT devices may not have a separate administrative interface, allowing anybody on the same network to attempt to log into them and making brute-force attacks possible.
C、IoT The device may not support strong encrypted communication , Expose log and sensor data to the network and be intercepted
The IoT devices may not support strong encryption for communications, exposing the log and sensor data to interception on the network.
D、IoT The long-term support and repair model of equipment may bring security and operational risks to the organization
The long-term support and patching model for the IoT devices may create security and operational risk for the organization.
subject 3
Q:Jill Is purchasing new network hardware for her organization . She found a gray market supplier who imported hardware from abroad at a lower price . What is the most important security issue of the hardware obtained in this way ?
Jill is working to procure new network hardware for her organization. She finds a gray market supplier that is importing the hardware from outside the country at a much lower price. What security concern is the most significant for hardware acquired this way?
A、 Security of hardware and firmware
The security of the hardware and firmware
B、 Availability of hardware and software support
Availability of support for the hardware and software
C、 Whether the hardware is the legal product of the actual supplier
Whether the hardware is a legitimate product of the actual vendor
D、 Age of hardware
The age of the hardware
---------------
There are more free network security tests and online tests , as well as 2022 Wechat learning discussion group , If necessary, you can add Mingxue online assistant vx:2711252101, Get and join the group .
---------------
subject 1
answer :C
analysis :IPsec VPN Will allow Andrea Keep her network as... When necessary 2 Layer flattened network operation , And provide security for the traffic she wants .TLS Run at a higher network layer , Although the flow can be transmitted through the tunnel .BGP It's a routing protocol ,AES It's encryption algorithm .
An IPsec VPN will allow Andrea to keep her networks running as layer 2 flattened networks when necessary while providing the security for her traffic that she wants. TLS operates at a higher network layer, although traffic could be tunneled through it. BGP is a routing protocol, and AES is an encryption algorithm.
subject 2
answer :D
analysis :Henry The most concern should be the long-term security and supportability of Internet of things devices . As these devices are increasingly embedded in buildings and infrastructure , It is important to understand the support model and the security model . It can be done by putting IoT The device is placed on a private subnet or network that prevents other users from directly accessing the device , To solve the problems of lack of separate administrative access rights and lack of strong encryption . This will help limit the risk , Without unnecessary cost or complexity , And it's a common practice . Last , Lack of storage space can be a problem , But when considering the possible risks of Internet of things devices , This is not the most important .
Henry's biggest concern should be the long-term security and supportability of the IoT devices. As these devices are increasingly embedded in buildings and infrastructure, the support model and security model are important to understand. Both the lack of separate administrative access and the lack of strong encryption can be addressed by placing the IoT devices on a dedicated subnet or network that prevents other users from accessing the devices directly. This will help limit the risk without undue expense or complexity and is a common practice. Finally, lack of storage space can be a concern, but is not the most important when looking at the risks IoT devices can create.
subject 3
answer :A
analysis : Each of these answers can be a question , But the most important security issue is whether the hardware and firmware can be trusted or may have been modified . Original equipment manufacturer (OEM) There are commercial reasons to ensure the safety of its products , But third parties in the supply chain may not feel the same pressure . The availability of support and the legality of hardware are also issues , But it's not a direct security issue . Last , The hardware may be older than expected , Or maybe it's used 、 Refurbished or not new .
Each of these answers may be a concern, but the overriding security concern is if the hardware and firmware can be trusted or may have been modified. Original equipment manufacturers (OEMs) have business reasons to ensure the security of their product, but third parties in the supply chain may not feel the same pressure. Both availability of support and whether the hardware is legitimate are also concerns, but less immediate security concerns. Finally, hardware may be older than expected, or may be used, refurbished, or other- wise not new.
版权声明
本文为[Tang Junfei - Mingxue Online]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204210610263282.html
边栏推荐
- 深度学习经典网络解析目标检测篇(一):R-CNN
- Rust: shared variable in thread pool
- 【ACM】70. 爬楼梯
- In win10 system, all programs run as administrator by default
- Batch export ArcGIS attribute table
- JD-FreeFuck 京东薅羊毛控制面板 后台命令执行漏洞
- ArcGIS license error -15 solution
- Resolve the error Max virtual memory areas VM max_ map_ count [65530] is too low, increase to at least [262144]
- Selenium + phantom JS crack sliding verification 2
- MATLAB从入门到精通(二)
猜你喜欢

ArcGIS table to excel exceeds the upper limit, conversion failed

MATLAB小技巧(6)七种滤波方法比较

Analysez l'objet promise avec le noyau dur (Connaissez - vous les sept API communes obligatoires et les sept questions clés?)

Robocode tutorial 8 - advanced robot

Matlab tips (6) comparison of seven filtering methods

A few lines of code teach you to crawl lol skin pictures

How to install jsonpath package

解决允许在postman中写入注释请求接口方法

PowerDesigner various font settings; Preview font setting; SQL font settings

Docker 安裝 Redis
随机推荐
Rust: how to implement a thread pool?
Selenium + webdriver + chrome realize Baidu to search for pictures
Mysql database backup command -- mysqldump
Differences between SSD hard disk SATA interface and m.2 interface (detailed summary)
logstash 7. There is a time problem in X. the difference between @ timestamp and local time is 8 hours
Robocode tutorial 7 - Radar locking
Rust: the output information of println is displayed during the unit test
Crawler for querying nicknames and avatars based on qqwebapi
Test post and login function
CISSP certified daily knowledge points (April 13, 2022)
Quantexa CDI(场景决策智能)Syneo平台介绍
Selenium + phantom JS crack sliding verification 2
WiFi ap6212 driver transplantation and debugging analysis technical notes
STM32 learning record 0008 - GPIO things 1
Linux installs MySQL in RPM (super simple)
硬核解析Promise對象(這七個必會的常用API和七個關鍵問題你都了解嗎?)
Read excel, int digital time to time
7-21 wrong questions involve knowledge points.
多功能工具箱微信小程序源码
Mysqldump backup database