2 - Telecommunications and Network Security Flashcards
1.Whichprotocolprovidesfull-duplex,connectionoriented,andreliablecommunicationsoveravirtualcircuit?a.TCPb.UDPc.IPd.ICMP
A: TCP provides full-duplex, connection oriented, reliable communications over a virtual circuit.
2.WhichofthefollowingisnotoneofthefourlayersoftheTCP/IPmodel?a.Applicationb.Sessionc.Internetd.NetworkAccess
B: Session is not one of the four layers of the TCP/IP model.
3.WhatisusedbybothTCPandUDPtotrackmultiplecommunicationsthatoccuroverthesamenetworkinterfacesimultaneously?a.IPaddressb.MACaddressc.Portaddressd.Applicationorserviceprotocol
C: The port address is used by both TCP and UDP to track multiple communication sessions.
4.HowislogicalcommunicationaccomplishedbetweenpeerlayersoftheOSImodel?a.Encapsulationb.Remoteprocedurecallsc.Memoryaddressingd.Packetswapping
A: Peer layers of the OSI model are able to logically communicate through encapsulation.
5.WhichofthefollowingisthecorrectorderoftheOSImodellayersfromlayerseventolayerone?a.Physical,DataLink,Network,Transport,Session,Presentation,Applicationb.Application,Presentation,Session,Transport,Network,DataLink,Physical.c.Physical,Network,Session,Transport,DataLink,Presentation,Applicationd.Application,Presentation,DataLink,Transport,Session,Network,Physical
B: The correct order of the layers of the OSI model starting with Layer 7 is Application, Presentation, Session, Transport, Network, Data Link, Physical.
6.AtwhatlayeroftheOSImodeldoesUDPoperate?a.Applicationb.Sessionc.Transportd.Network
C: UDP operates at the transport layer.
7.AtwhatlayeroftheOSImodeldoestheIPprotocoloperate?a.Presentationb.Sessionc.Transportd.Network
D: The IP protocol operates at the Network layer.
8.WhichofthefollowingisnotatrueorvalidcharacteristicoftheTCPprotocol?a.Connectionlessb.Fullduplexc.Usesacknowledgementsd.Sequencedsegments
A: TCP is connection-oriented, not connectionless.
9.AtwhatlayeroftheTCP/IPmodelisdatacalledasegment?a.Applicationlayerb.Host-to-HostorTransportlayerc.InternetorNetworklayerd.NetworkAccesslayer
B: At the Host-to-Host or Transport layer data is called a segment.
10.Theoccurrenceofelectronicsignalsspillingoverfromonewiretoanotherisknownas?a.attenuationb.noisec.crosstalkd.superzaping
C: Crosstalk is the occurrence of electronic signals spilling over from one wire to another.
11.WhatTCP/IPsub-protocolcanbeusedtotransferfilesbutrequiresnoauthentication?a.Telnetb.BootPc.LPDd.TFTP
D: TFTP is used to transfer files but does not use authentication.
12.WhichofthefollowingisnotpartoftheTCPhandshakeusedtoinitiateacommunicationsconnection?a.FINb.ACKc.SYNd.SYN/ACK
A: FIN is only used to terminate an existing TCP communications link.
13.AtwhatlayerisdatalabeledasegmentwithintheTCP/IPmodel?a.Applicationb.Host-to-Hostc.Internetd.NetworkAccess
B: The data is labeled a segment in the host-to-host layer of the TCP/IP model.
14.Whatistheabstractprotocolmodelthatiswidelyusedasthestandardframeworkfordesigningapplicationsandnetworkprotocols?a.Clark-Wilsonmodelb.OSImodelc.NetBIOSd.MACaddressing
B: The OSI model is the abstract protocol model that is widely used as the standard framework for designing applications and network protocols.
15.ThethirdlayeroftheOSImodelis?a.Sessionb.Transportc.Networkd.DataLink
C: The Network layer is the third layer of the OSI model.
16.SSL(securesocketslayer)operatesatwhatleveloftheOSImodel?a.Networkb.Transportc.DataLinkd.Session
B: SSL (secure sockets layer) operates at the transport level of the OSI model.
17.EthernetisanexampleofwhattypeofLANtransmissionprotocol?a.Broadbandb.CSMAc.CSMA/CAd.CSMA/CD
D: Ethernet is a CSMA/CD Carrier-Sense multiple Access with Collision Detection LAN transmission protocol.
18.Whattypeoffirewallisabletoself-modifyitstrafficfilters?a.Dynamicpacketfilteringb.Kernelproxyc.Statefulinspectiond.Applicationlevel
A: A dynamic packet filtering firewall is able to self-modify its traffic filters.
19.LogicalcommunicationbetweenpeerlayersoftheOSImodelaremadepossiblethroughtheuseof?a.encapsulationb.remoteprocedurecallsc.directaddressingd.broadcasts
A: Logical communication between peer layers of the OSI model are made possible through the use of encapsulation.
20.Whichofthefollowingcannotbeusedtoexchangefiles?a.FTPb.NFSc.TFTPd.Telnet
D: Telnet cannot be used to exchange files, rather it is limited to running applications or commands remotely.
21.Whichofthefollowingprotocolsisusedfore-mail?a.SMTPb.LPDc.SNMPd.BootP
A: SMTP or Simple Mail Transport Protocol is used to transmit e-mail from server to server and from client to server.
22.WhatisthelastcommunicationbetweentwosystemsoveraTCP/IPconnectionbeforeactualdatacanbeexchanged?a.FINb.ACKc.SYN/ACKd.SYN
B: ACK is the third and final element of the three-way handshake that establishes a communication link between two systems. Once the ACK is received, actual data can be communicated.
23.WhichofthefollowingisnotasecurityserviceusedtoprotectOSIcommunications?a.auditingb.authenticationc.dataintegrityd.packetreceiptacknowledgement
A: Auditing is not a security service used to protect OSI communications.
24.TCPprovidesforallbutwhichofthefollowing?a.full-duplexcommunicationsb.connectionlesscommunicationsc.dataflowmanagementthroughslidingwindowsd.reliablecommunicationvirtualcircuits
B: TCP is connection oriented, UDP is connectionless.
25.Whichofthefollowingusesacknowledgementstoensurethatdataisdeliveredtotherecipient?a.UDPb.IPc.TCPd.TFTP
C: TCP is a reliable communications protocol since it does not use acknowledgements.
26.Whichofthefollowingtechnologiesisbasebandinsteadofbroadband?a.ATMb.ISDNc.DSLd.Ethernet
D: Ethernet is a baseband communication mechanism.
27.Thetypeofnetworktransmissionthatoriginatesfromasinglesourcebutisdirectedtowardmultiplespecificdestinationsisknownas?a.multicastb.broadcastc.unicastd.polling
A: Multicast is a type of network transmission that originates from a single source but is directed toward multiple specific destinations.
28.WhatLANmediaaccessmethodcanbeusedtoconnectsystemsupto2kmapart,supporttransmissionratesupto100MBps,ishighlyresistanttoelectromagneticandradiofrequencyinterference,andisoftenusedtoconnectseveraldifferenttypesofnetworks?a.GigabitEthernetb.FiberDistributedDataInterface(FDDI)c.CopperDistributedDataInterface(CDDI)d.AsynchronousTransferMode(ATM)
B: Fiber Distributed Data Interface (FDDI) is a LAN media access method can be used to connect systems up to 2 km apart, support transmission rates up to 100MBps, is highly resistant to electromagnetic and radio frequency interference, but which does not use virtual circuits. FDDI is a two-ring based token-passing media access topology.
29.Whichofthefollowingisnotavalidreasontodeployanetwork?a.shareresourcesb.enablecommunicationsbetweensystemsc.increasesecurityd.centralizeadministration
C: Networks are inherently less secure than stand alone systems. Therefore, deploying a network is a reduction in security, not an improvement.
30.Whatcategoryoftwistedpaircablingisratedtosupport1Gbpsofthroughput?a.Cat1b.Cat3c.Cat5d.Cat7
D: Cat 7 cable is rated for 1Gbps.
31.AnetworkengineercreatesasinglenetworkbyconnectingthehubofoneofficefloortoanotherhubonanotherfloorusingaheavilyinsulatedCAT5cable.Oneofficeisonthefirstfloor,theotherisonthe48thfloor.Thesystemsarefullycompatible,butcommunicationsbetweenthetwofloorsoverthenetworkconnectionisverypoor.Whatismostlikelythecauseofthis?a.attenuationb.noisec.crosstalkd.protocolmismatch
A: Attenuation is the loss of signal strength caused by excessive cable length. This situation is most likely caused by attenuation.
32.Whyshouldplenumcablebeusedwhenwiringanewsecurefacility?a.itpreventswiretappingb.itwon’tproducetoxicfumeswhenburnedc.itincreasesthethroughputcapacityoftheITinfrastructured.itislessexpensivethanotheralternatives
B: Plenum cable should be used when wiring any facility since it won’t produce toxic fumes when burned.
33.Whichofthefollowingstatementsisnottrueregardingasynchronoustransmissions?a.receivermustalwaysbeinthereadytoreceivestateb.usedprimarilyforsmallamountsofdatac.timedtoaclockingmechanismd.oftenusesstopandstartdelimiterbits
C: Synchronous transmissions uses a clocking mechanism, asynchronous transmissions do not.
34.Whattypeoffirewallcreatesavirtualcircuitbetweentheworkstation/clientsystemandtheserver?a.astaticpacketfilteringfirewallb.astatefulinspectionfirewallc.akernelproxyfirewalld.asecondgenerationfirewall
D: A second generation firewall (an application level firewall, an application layer gateway, a circuit level firewall, a proxy server) creates a virtual circuit between the workstation/client system and the server.
35.Whichofthefollowingisnotatruestatementaboutthirdgenerationfirewalls?a.theyoffersignificantlydecreasedperformanceb.theyarestatefulinspectionfirewallsc.theyoperateatthenetworklayerd.theyexaminethestateandcontentofdata
A: Third generation firewalls, or stateful inspection firewalls, offer improved performance over first and second generation firewalls.
36.Adynamicpacketfilteringfirewallisknownaswhatgenerationoffirewall?a.fifthb.fourthc.thirdd.second
B: A fourth generation firewall is a dynamic packet filtering firewall.
37.Whatnetworkdeviceisusedspecificallytosafeguardagainstattenuation?a.hubb.bridgec.repeaterd.router
C: A repeater is a network device used specifically to safeguard against attenuation. Repeaters operate at layer 1 of the OSI model.
38.Whichofthefollowingnetworkdevicesoperatesexclusivelyatlayer3oftheOSImodel?a.bridgeb.repeaterc.switchd.router
D: Routers operate at layer 3 of the OSI model.
39.Whatnetworkdevicecanbeusedtolinktwoormorenetworkstogethereveniftheyusedifferenttopologies?a.gatewayb.hubc.bridged.repeater
A: A gateway can link two or more networks together even if they use different topologies.
40.Whichofthefollowingisnottrueinregardstoascreened-hostorsacrificial-hostfirewall?a.usespacketfilteringb.providesnetworkandapplicationlayerfilteringc.usesabastionhostd.isafirstgenerationfirewall
D: A screened-host or sacrificial-host firewall is NOT a first generation firewall
41.Whichofthefollowingisnotavalidnameordesignationforanapplicationlevelfirewall?a.proxyserverb.circuitlevelfirewallc.adynamicfirewalld.secondgenerationfirewall
C: An application level firewall or application layer gateway is not a dynamic firewall, it is a static firewall.
42.Abenefitofusingnetworkaddresstranslationis?a.proxyservicesb.privateIPaddressesc.trafficthrottlingd.packetfiltering
B: NAT allows private IP addresses to be used in a private network and still support communications with the Internet.
43.Networkaddresstranslationcanalsobereferredtoas?a.redirectionb.trafficroutingc.IPmaskingd.virtualcircuits
C: IP masking is another name for NAT. NAT masks the assigned IP address of its internal clients from all external users and services.
44.WhichofthefollowingisnotoneofthesevenoriginaltopleveldomainnamesusedontheInternet?a..edub..milc..orgd..biz
D: .biz is not one of the seven original top-level domain names used on the Internet.
45.Ahostsystemcanbeafirewallifallbutwhichofthefollowingaretrue?a.twoNICsarepresenteachinadifferentnetworkb.thesameprotocolisusedonbothnetworksc.thesamenetworktopologyisusedonbothnetworksd.IPforwardingisdisabled
C: The connected networks need not use the same networking topology. As long as the NICs support the correct topology and the networks use the same protocol, a host server can act as a firewall.
46.ADMZordemilitarizedzoneisusedinanetworkingcontextforwhatprimarypurpose?a.toallowsystemsintheDMZtobeeasilyaccessedbyInternetusersb.toprovideameansbywhichaprivatenetworkcanbeconnectedtotheInternetc.toenableVPNconnectionsfromremoteusersd.toprovideahigherlevelofsecurityfortheprivatenetwork
D: to provide a higher level of security for the private network
47.WhatnetworkingmechanismisusedtoallowcommunicationsfromaprivatenetworktotheInternettooccurwithoutenablingInternetuserstoinitiatecommunicationsorextractinternalnetworkconfigurationinformationfromtheinteractions?a.networkaddresstranslationb.routerc.firewalld.virtualprivatenetworking
A: Network address translation (NAT) allows private network clients to initiate communications with Internet services, but it does not allow Internet users to initiate communicates into the private network nor to extract network configuration information about the private network from any communications intercepted by external users.