CISSP®- The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 Revision 4

Interactive Video
•
Information Technology (IT), Architecture, Other
•
University
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was a primary reason IPV4 was not initially designed with security features?
There was no need for confidentiality.
It was meant for a closed network.
It was designed for wireless networks.
Security features were too expensive.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is PAP considered insecure?
Credentials are sent in plaintext.
It uses strong encryption.
It requires mutual authentication.
It is too complex to implement.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol uses a three-way handshake for authentication?
CHAP
EAP
PAP
VPN
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key feature of EAP-TLS?
It requires no certificates.
It uses public key infrastructure.
It is vulnerable to man-in-the-middle attacks.
It only supports client-side authentication.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which EAP variant is known for being weak and vulnerable to attacks?
EAP-TLS
PEAP
EAP-MD5
LEAP
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common use of VPNs?
To increase internet speed.
To access restricted content.
To reduce data usage.
To eliminate the need for passwords.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why are PPTP and L2TP not recommended for use today?
They are too fast for secure connections.
They require special hardware.
They lack built-in encryption.
They are too expensive.
Similar Resources on Wayground
8 questions
Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 1 (Part2)

Interactive video
•
University
8 questions
Master Microservices with Spring Boot and Spring Cloud - Step 42 – Understanding the Need for Spring Cloud Bus

Interactive video
•
University
6 questions
AZ-104: Microsoft Azure Administrator Full Course - Azure AD Versus On-Premises Active Directory

Interactive video
•
University
6 questions
World of Computer Networking Your CCNA start - Introduction "What is a Computer Network?"

Interactive video
•
University
6 questions
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - IPSec and PGP

Interactive video
•
University
2 questions
Active Directory with Windows Server 2016 - Configuring Authentication Policies and Silos

Interactive video
•
University
6 questions
Linux PAM Security Administration - Linux PAM Administration - Introduction

Interactive video
•
University
6 questions
AZ-104: Microsoft Azure Administrator Full Course - What is a Load Balancer - II

Interactive video
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University