IT CertificationsAnswer Key

Boson Test Cissp

50 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Throughput

ANSWER

Can be measured by the amount of time the authentication process takes

QUESTION 2

Kerberos Secret Key Storage

ANSWER

Clear text format

QUESTION 3

ESP in Transport Mode

ANSWER

Encrypts only the data sent over the IPSec VPN tunnel

QUESTION 4

ESP in Tunnel Mode

ANSWER

Encrypts the entire packet including headers

QUESTION 5

Object Oriented Database

ANSWER

Combines data and functions in a code-accessible framework

QUESTION 6

Change Management Step Interfacing the Most with Configuration Management

ANSWER

Documentation

QUESTION 7

Security Policy Best Practice

ANSWER

Short as possible

QUESTION 8

Base Metrics (CVSS)

ANSWER

Indicate the severity of the vulnerability and have largest influence on the final CVSS score

QUESTION 9

Temporal Metrics (CVSS)

ANSWER

Indicate the urgency fo the vulnerability and can change over time

QUESTION 10

Environmental Metrics (CVSS)

ANSWER

Optional and indicate how much an environment or end-user organization is affected by a vulnerability

QUESTION 11

CSU/DSU

ANSWER

Required to connect a data terminal equipment device such as a router to a digital circuit

QUESTION 12

/etc/shadow

ANSWER

Linux system file that contains secure user account info and can only be read by root

QUESTION 13

Explicit Permission

ANSWER

Permission assigned to a user at the user account level

QUESTION 14

Smart Phone Flash Memory

ANSWER

Data at rest stored on the device

QUESTION 15

Zachman Framework for Enterprise Architecture

ANSWER

ACM based methodology that enables the viewing of an architecture from six different perspectives

QUESTION 16

Finality Principle (EU)

ANSWER

Requires that data collected by an organization that monitors its employees be used for a specific, explicit, and legitimate purpose

QUESTION 17

Clark-Wilson

ANSWER

Focused on information integrity

QUESTION 18

Hybrid Security Guard Program

ANSWER

Combination of the proprietary security guard system and the contract security guard system

QUESTION 19

Dedicated Mode

ANSWER

Each user must have security clearance, access approval, and a valid need to know for all information processed by a system

QUESTION 20

System High Mode

ANSWER

A user must have a security clearance and access approval for all info processed by the system. They must also have a valid need to know for the information they will access on the system

QUESTION 21

Compartmented Mode

ANSWER

A user must have security clearance for all info processed by the system. They must also have access approval and a valid need to know for the information they will access on the system

QUESTION 22

Multilevel Mode

ANSWER

A user must have a security clearance, access approval, and a valid need to know that permits only the info they will access on the system

QUESTION 23

Side-Channel Attack

ANSWER

Passive attacks that are intended to glean info from a device by observing how the device operates under given conditions

QUESTION 24

CSMA/CA

ANSWER

Requires that the receiving device send acknowledgements

QUESTION 25

Static Software Testing

ANSWER

Includes walkthroughs, sanity checks, syntax checks, and logical reviews of code

QUESTION 26

Directory Traversal

ANSWER

Enables attacker to steal file contents from locations outside the web server's publicly accessible home directory on the server

QUESTION 27

False Positive (Vulnerability Assessment)

ANSWER

When an assessment identifies a business requirement as a vulnerability

QUESTION 28

What OSI layers correspond to the Network Access Layer of the TCP/IP Model?

ANSWER

Physical and Data Link

QUESTION 29

What OSI layer corresponds to the Internet Layer of the TCP/IP Model?

ANSWER

Network

QUESTION 30

What OSI layer corresponds to the Host-to-Host Layer of the TCP/IP Model?

ANSWER

Transport

QUESTION 31

What OSI layer corresponds to the Application Layer of the TCP/IP Model?

ANSWER

Session, Presentation, and Application

QUESTION 32

Layer 2 Ring Model

ANSWER

Device Drivers

QUESTION 33

Layer 1 Ring Model

ANSWER

OS Components that are not the kernel

QUESTION 34

Heap Metadata Protection

ANSWER

Buffer overflow protection

QUESTION 35

Private IP Range per RFC 1918

ANSWER

10.0.0.0 through 10.255.255.255; 172.16.0.0 through 172.31.255.255; 192.168.0.0 through 192.168.255.255

QUESTION 36

MIC

ANSWER

Feature of WPA that helps protect against man-in-the-middle attacks

QUESTION 37

Checksum

ANSWER

Output from a one-way hash function

QUESTION 38

VM Task Involving Enumeration of All Security Risks within a System

ANSWER

Vulnerability Scanning

QUESTION 39

Photoelectric Motion Sensor

ANSWER

Emits a beam of light to another sensor across a path that is monitored by the sensor

QUESTION 40

Passive Infrared Motion Sensor

ANSWER

Detects energy that is generated by body heat

QUESTION 41

DNS OSI Model Layer

ANSWER

Application (Layer 7)

QUESTION 42

Ephemeral Ports

ANSWER

Not assigned by IANA; Private/dynamic ports

QUESTION 43

Birthday Attack

ANSWER

Attempts to find two passwords with matching hashes

QUESTION 44

P2PE

ANSWER

Point to point encryption solution to prevent cardholder data theft

QUESTION 45

Facial Scan

ANSWER

Process of taking a person's photograph and comparing it to identified photographs in a database

QUESTION 46

Coaxial Cable

ANSWER

Contains single copper conductor at the cable core surrounded by shielding to mitigate data emanation from eh core

QUESTION 47

Fiber Optic Cable

ANSWER

Contains one or more glass or plastic fibers that are used to transmit data by using light signals

QUESTION 48

Pharming Attack

ANSWER

DNS cache poisoning attacks that attempt to modify a DNS cache by providing invalid information to a DNS server

QUESTION 49

IDS Primary Benefit

ANSWER

have a low false positive rate

QUESTION 50

Modern Ethernet Topology

ANSWER

Star

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials