RCR 076: CISSP Exam Questions on Encryption - CISSP Training and Study

Published: March 1, 2020, 12:43 p.m.

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. 

In this episode, Shon will provide CISSP training for Domain 6 (Security Assessment and Testing) of the CISSP Exam.  His extensive training will cover all of the CISSP domains.

BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/

CISSP Exam Questions

Question:  110

Tom would like to test system that lie within his network for vulnerabilities that could be exploited by the most recent set of ransomware variants.  Which one of the following tools would be best suited to accomplish this task?

  1. Network discovery scanner
  2. Network vulnerability scanner
  3. Web vulnerability scanner
  4. Ping sweep

Explanation [b] A network vulnerability scanner would be the best tool for discovering what vulnerabilities reside within your network.

-----------------------------------

Question:  111

  1. When trying to gain the most detailed information about a system from a scan, what is the best scan to meet that objective?
    1. Port Scan
    2. Authenticated Scan
    3. Vulnerability Scan
    4. Unauthenticated Scan

Explanation: [b] An authenticated scan allows you to use credentials which will provide you the most detailed information.   An unauthenticated scan will only provide you a view that is available from the outside and may not be an adequate or fair assessment of the system. 

------------------------------------

Question:  112

What is the most common port used to communicated encrypted traffic on a web server?

  1. 22
  2. 143
  3. 80
  4. 443

Explanation: [d] 443 is the common standard where encrypted communications use for transmitting data.  However, any port can be used for encrypted data, but 443 is considered the common standard. 

------------------------------------

Want to find Shon elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

Facebook - https://www.facebook.com/CyberRiskReduced/

 

LINKS: