Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
127 Cards in this Set
- Front
- Back
In the OSI reference model , on which later can a telphone number be described?
|
This depends on the nature of the telephony system (for instance, Voice-over-IP versus
public switched telephony network (PSTN)) |
|
Which transmission modes exist on OSI layer 5?
|
Simplex, half duplex, duplex
|
|
3. In which of the following situations is the network itself not a target of attack?
|
MiTM
|
|
Which of the following are effective protective or countermeasures against a distributed denialof-
service attack? a = Redundant network layout; b = Secret fully qualified domain names (FQDNs); c = Reserved bandwidth; d = Traffic filtering; e = Network Address Translation (NAT). |
c. a and c
|
|
5. What is the optimal placement for network-based intrusion detection systems (NIDSs)?
|
On network segments with business-critical systems (e.g., demilitarized zones (DMZs)
and on certain intranet segments) |
|
Which of the following are meaningful uses for network-based scans? a = Discovery of devices
and services on a network; b = Test of compliance with the security policy; c = Detection of attackers in a network, for instance, sniffers; d = Test for vulnerabilities and backdoors, for instance, as part of a penetration test or to detect PCs infected by Trojans; |
b. a, b, and d
|
|
7. Which of the following is an advantage of fiber-optic over copper cables from a security
perspective? |
b. Fiber optics are more difficult to wiretap.
|
|
8. Which of the following devices should not be part of a network's perimeter defense?
boundary router, firewall, proxy server |
non of the above
|
|
9. Which of the following is a principal security risk of wireless LANs?
|
a. Lack of physical access control
|
|
10. Which of the following configurations of a WLAN's SSID offers adequate security protection?
|
d. None of the above
|
|
11. Which of the following is the principal security risk of broadband Internet access proliferation for
home users? |
Home computers that are not securely configured or maintained and are permanently
connected to the Internet become easy prey for attackers. |
|
12. Who should be allowed to change rules on a firewall and for which reason?
|
The firewall administrator in compliance with a change process that will, in particular,
validate the request against the organization's security policy and provide proper authorization for the request |
|
13. Which of the following is the principal benefit of a personal firewall?
|
They provide a PC on a public network with a reasonable degree of protection; if the PC
connects to a trusted network later on (for instance, an Intranet), it will prevent the PC from becoming an agent of attack (e.g., by spreading viruses). |
|
14. Which of the following are true statements about IPSec?
|
provides mechanisms for auth an encryption and authenticates hosts against each other
|
|
15. Which of the following statements about well-known ports (0 through 1023) on layer 4 is true?
|
On most operating systems, use of well-known ports requires system-level
(administrative, superuser) access. |
|
Which of the following is the enabler for TCP sequence number attacks, and which mitigation
exists? |
The fact that sequence numbers can be predicted, enabling insertion of illegitimate
packets into the data stream. Mitigation is offered by better randomization, as described in RFC 1948. |
|
17. Which of the following is the principal weakness of DNS (Domain Name System)?
|
Lack of authentication of servers, and thereby authenticity a. of records
|
|
18. Which of the following statements about open e-mail relays is incorrect?
|
Using a blacklist of open e-mail relays provides a secure way for an e-mail administrator
to identify open mail relays and filter spam. |
|
19. A cookie is a way to:
|
b. Add statefulness to the (originally stateless) HTTP
|
|
20. From a disaster recovery perspective, which of the following is the principal concern associated
with Voice-over-IP services? |
They can make the IP network of an organization a single point of failure for
communication. |
|
21. Why is public key encryption unsuitable for multicast applications?
|
c. All data is going to all members of the multicast group.
|
|
IEEE 802.3 defines
|
Ethernet
|
|
IEEE 802.5 defines
|
Token ring
|
|
Which WLAN spec uses OFDM
|
802.11a, 802.11g
|
|
2.4GHz WLAN specs
|
802.11b,g
|
|
protocol which uses PVCs and SVC. Overhead requirement limit it to lower speeds
|
X.25
|
|
high performance packet switching technology designed to replace X.25
|
Frame Relay
|
|
Very high speed, similar to Frame relay.uses PVCs and SVC. carry all traffic types
|
ATM
|
|
standard protocol for enabling wireless data access via small portable terminals to secure transaction service
|
Wireless Application Protocol (WAP)
|
|
What document defines the OSI model
|
ISO 7498
|
|
Layer 2 consists of what
|
1) Logical Link Control
2) Media Access Control |
|
In the OSI reference model, which layer can Ethernet be described
|
Layer 2
|
|
Which of the following are effective protective countermeasures against DDOS
|
Redundant network layout, Reserve bandwidth and traffic filtering
|
|
OPtimal placement for NIDS?
|
network perimeter
|
|
A Security Event Manager (SEM)...
|
aggregates logs from secuirity devices and application server looking for suspicious activity
|
|
Methodology of an Attack step
|
1. Target Acquisition
2. Target Analysis 3. Target Access 4. Target appropriation |
|
802.11i defines
|
RSNs, WPA-AES, security
|
|
802.1x defines
|
port security
|
|
T/F PAP transmits password in the clear
|
true
|
|
how does CHAP transmit the password
|
one-way hash
|
|
T/F CHAP features periodic authentication
|
true
|
|
Radius and EAP fall under
|
802.1x
|
|
protocol provides bandwidth mgmt and a scalable solutions for network usage without the performance penalties of encryption
|
MPLS
|
|
what type of proxy does not inspect any traffic
|
circuit proxy
|
|
another name for a screened subnet is a
|
DMZ
|
|
a popular circuit proxy server that can act as a VPN
|
SOCKS
|
|
IKE consists of
|
OAKLEY and ISAKMP
|
|
IPSEC offers
|
encryption & auth
|
|
SOCKS offers
|
only Auth
|
|
SSH offers
|
encryption and auth
|
|
L2F offers
|
tunnine
|
|
L2TP offers
|
only auth (but encryption w/ IPSec)
|
|
PPTP offers
|
encryption, auth (MSCHAPv2)
|
|
MPLS offers
|
only tunneling
|
|
SSL/TLS offers
|
Encryption and auth
|
|
Two modes of IPSec
|
Transport (payload only)
Tunnel (paylod + header) |
|
a Security Assocation, used by network device to identify connections, consist of:
|
1) SPI
2) IP Dst address 3) AH or ESP identifier |
|
an Autonomous system is controlled by
|
one organization
|
|
Java RMI and Microsoft's .NEt function at what layer
|
Layer 5 (session)
|
|
Aside from TCP & UDP what is another Layer 4 protocol
|
SPX
|
|
what layer ensure a common format for data (ASCII/Unicode, codecs)
|
Layer 6-Presentation
|
|
GPRS, 1xRTT (144kbps) represent which generation
|
2.5 generation
|
|
Analog cellular is what generation
|
1st generation
|
|
TDMA, GSM, CDMA represent which generation
|
2nd generation
|
|
DNSSEC uses what to secure dtat
|
digital signatures
|
|
IPSec provies whcih security features
|
Connectionless Integrity
|
|
In a very large organization, where th user pop ulation is dynamic and static apassword are undesirable, which method of authentication would be desireable?
|
CHAP, b/c MSCHAP is non standard
|
|
One of the main risks associated with VOIP may be:
|
DoS
|
|
Which layer is least suitable when end-to-end encryption is needed
|
data-link
|
|
Which of the following network technologies would be best suited to operate in an Error-prone environment
|
X.25
|
|
what protocol has the overhead of ACKs for each hop, and has a strong focus on error correction
|
X.25
|
|
unless what it's built on, assumes the cloud is reliable
|
Frame Relay
|
|
which of these routing protocols support optional authentication?
I) RIP v1 II) RIP v2 III) OSPF v3 IV) BGP v4 |
D) II,III,IV
|
|
L2TP provides confidentiality (T/F)
|
False, no encryption!!!
|
|
L2TP is a comnination of Cisco and MS's
|
L2F and PPTP
|
|
Convergine voice, video and data onto the same network infrastructure poses many challenges. Which of the following technologies would offer the greatest advantage when dealing with the different needs of Voice, video and data?
|
ATM
|
|
What is the most important consideration when designing a firewall architecture?
|
Understand the specific security needs of the business
|
|
Which of the following criteria should be met by off-site storage protetion for media backup?
|
The storage site should guard against unauthorized access
|
|
Which of the following can assist in preventing denial of service attacks?
|
Configure the router to check all outgoing traffic
|
|
The main difference between penetration testers and hackers is
|
pen tester have permission from the company
|
|
which of the following is a list of actice attacks against WLAN?
|
Masquerade, Replay, Message modification, and DoS
|
|
which wirless technology operaing in 5GHz
|
802.11a
|
|
what security pratices should be implemented to suppor wireless security
|
Policy, Change Control and Configuration mgmt
|
|
which of these types of scan is more often doen by white hat penetration testers rather than attackers
|
Compliance scanning
|
|
HDLC and SDLC operate at what layer`
|
2: data link
|
|
ISDN consists of what two channels
|
B (data)
D (signaling) |
|
What is a beaconing functionality in a token passing technology?
|
Excludes a misbehaving computer from the ring
|
|
Another name for ThinNet
|
10Base2
|
|
Which of the following is a disadvantage of PPTP?
|
Works only over IP
|
|
a SONET architecture at a large university connecting internal network in each building is an example of
|
MAN
|
|
Not every data transmission incorporates the session layer. Which of the following best describes the functionality of the session layer?
a) end-to-end transmission b) application client/server communication mechanism in a distributed environment c) Application to computer physical communication d) Provides application with the proper syntax for transsmission |
Application client/server communication mechanism in a distributed environmen
|
|
Which polling protocol is used mainly to communicate with IBM mainframe systems?
|
Synchronous Data Link Control
|
|
What is the purpose of the LLC layer in the OSI model
|
provides a standard interface for the network layer protocol
|
|
Ethernet uses what type of access method?
|
CSMA/CD
|
|
Which of the following tunneling protocol would be used if tunneled communications needed to take plae over X.25, ATM or Frame Relay
|
L2TP
|
|
A corporate vice president routinely using his office phon for personal international phon calls in as example of what secuirty issue?
|
Telephone fraud
|
|
which of the following is required for LAN and WAN-centralized access control technologies?
|
system with database of authentication information
|
|
All of the following are true about bastion hosts except:
|
protected by the DMZ and has internal user accounts
|
|
what is the port range for well-known ports
|
0-1023
|
|
bandwidth of T3
|
45Mbps
|
|
SONET works at which layer
|
Layer 1: physical
|
|
What are two ways HDLC improves upon SDLC
|
1) provides higher throughput
2) supports full-duplex transmission |
|
Which of the following is not true about ISDN?
a) required both B & D channels b) supports voice, data, video transmission c) sends control information over the B channel d) uses the same wires as analog transmission |
c) sends controll information over the B-channel
|
|
What is the electronic phenomenon that allows data to escape in a bundle of network cables?
|
Cross-talk
|
|
What is the importance of using plenum-rated cabling in buildings
|
Human safety
|
|
How are FDDI and FDDI-2 different
|
FDDI-2 allows for fixed bandwidth to be assigned.
|
|
In the TCP/IP model, where does PPP protocol reside
|
Network Access
|
|
how many bearer (B) channels does BRI ISDN have
|
2
|
|
how many bearer (B) channels does PRI ISDN have
|
23
|
|
UMTS, EVDO are what generation
|
3d Generation
|
|
nonces prevent
|
replay
|
|
difference between PEAP and EAL-TLS
|
EAP-TLS sends User Identity in the clear
PEAP sends a Domain Identifier instead BUT EAP-TTLS protect user ID as well |
|
what is the difference between open system authentication and shared key authentication
|
SKA requires a WEP encryption key
|
|
Paying for a guaranteed amount of frame relay bandwidth is called what
|
CIR (Committed Information rate)
|
|
In which technology do different user share the same network medium?
|
cable modem
|
|
which of the following is true about a SSID value
|
It is a value that the wireless device uses to authenticate the AP
|
|
Backbones that connect businesses to WANs , the Internet and other business usually via SONET networks are called what
|
MANs
|
|
which of the following is a reason companies implement routers and packet filters?
|
to provide protection that is transparent to users
|
|
How does PPTP provide protection
|
Through encryption and encapsulation
|
|
a WAN technology that uses 53-byte cells and has low delay levels is called what?
|
ATM
|
|
all data is is fragmented into fixed-length 53-byte cless..connection oriented suite of protocols. does not guarantee delivery of cells
|
ATM
|
|
Is DSL always on
|
yes
|
|
what replaced SLIP
|
PPP
|
|
what is a good definition of asynchronous communication
|
sequential data transfer, using bits framed with start and stop bits
|
|
What would be the best tool to deal with a distribute port scan?
|
Firewall
|
|
Principal benefit of personal firewalls
|
provide a PC on a public netowrk with a reasonable degree of protection; if the PC connects to a trusted netowrk later on , it will prevent the PC from becoming an agent of attack
|
|
factors when configuring audit logs
|
value of asset, threats against asset, sensitivity of asset
|