IT CertificationsAnswer Key

Boson Cissp

21 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

what ethernet field contains a 4-byte cyclic redundancy check, CRC, value?

ANSWER

Frame check sequence, FCS.

QUESTION 2

Swapping

ANSWER

Processes are swapped in and out of main memory to the disk.

QUESTION 3

minutiae in access control

ANSWER

loops, whorls, ridges, and bifurcations in a fingerprint.

QUESTION 4

Tripwire

ANSWER

Host-based IDS. Monitors integrity of critical OS files.

QUESTION 5

RPC

ANSWER

Remote Procedure Call. Session layer. Allows a client to execute a process on a remote server.

QUESTION 6

Tcp/IP model

ANSWER

-armadillos take in new ants, From the top,- application, transport, internet, network access

QUESTION 7

RAID 5

ANSWER

Striping with parity; only protects against single drive failure, need minimum of 3 disks.

QUESTION 8

pharming attack

ANSWER

uses a zombie farm to launch a massive phishing attack by poisoning a DNS server

QUESTION 9

After completion of an SSL handshake, a ___ key is used to provide security.

ANSWER

symmetric session

QUESTION 10

A service account enables:

ANSWER

an application to perform system level actions.

QUESTION 11

Type 2 Authentication

ANSWER

Something you have

QUESTION 12

___ divides CPU time among Child processes

ANSWER

multithreading

QUESTION 13

Pointer encoding

ANSWER

buffer overflow protection mechanism recommended, but not required, in the microsoft security development lifecycle.

QUESTION 14

RSA is particularly susceptible to:

ANSWER

Chosen ciphertext attacks. Attackers can encrypt plaintext with the user's public key and analyze the result.

QUESTION 15

___ was found to be susceptible to POODLE attacks in 2014.

ANSWER

SSL

QUESTION 16

Protocol that secures communication between a web browser and a web server

ANSWER

Transport Layer Security

QUESTION 17

Database replication

ANSWER

Mirrors a Live database, allowing simultaneous reads and writes.

QUESTION 18

Memory aid for smurf attacks

ANSWER

I see my papa (icmp) smurf, smurf, smurf. DoS attack using ICMP echo requests.

QUESTION 19

CPU Pipelining stages

ANSWER

Fetch, decode, execute, write

QUESTION 20

Wireless standards that use orthogonal frequency division multiplexing (ofdm)

ANSWER

802.11, A., G, & N.

QUESTION 21

TLS replaced ___, which was officially deprecated in 2015.

ANSWER

SSL, secure sockets layer

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials