Ch 12 Flashcards
- __________________ is a layer 2 connection mechanism that uses packet-switching technology to establish virtual circuits between the communication endpoints.
A. ISDN
B. Frame Relay
C. SMDS
D. ATM
Answer: B
Frame Relay is a layer 2 connection mechanism that uses packet-switching technology to establish virtual circuits between the communication endpoints. The Frame Relay network is a shared medium across which virtual circuits are created to provide point-to-point communications. All virtual circuits are independent of and invisible to each other.
- Tunnel connections can be established over all except for which of the following?
A. WAN links
B. LAN pathways
C. Dial-up connections
D. Stand-alone systems
Answer: D
A stand-alone system has no need for tunneling because no communications between systems are occurring and no intermediary network is present.
- __________________ is a standards-based mechanism for providing encryption for point-to-point TCP/IP traffic.
A. UDP
B. IDEA
C. IPSec
D. SDLC
Answer: C
IPSec, or IP Security, is a standards-based mechanism for providing encryption for point-to-point TCP/IP traffic.
- Which of the following IP addresses is not a private IP address as defined by RFC 1918?
A. 10.0.0.18
B. 169.254.1.119
C. 172.31.8.204
D. 192.168.6.43
Answer: B
The 169.254.x.x subnet is in the APIPA range, which is not part of RFC 1918. The addresses in RFC 1918 are 10.0.0.0–10.255.255.255, 172.16.0.0–172.31.255.255, and 192.168.0.0–192.168.255.255.
- Which of the following cannot be linked over a VPN?
A. Two distant Internet-connected LANs
B. Two systems on the same LAN
C. A system connected to the Internet and a LAN connected to the Internet
D. Two systems without an intermediary network connection
Answer: D
An intermediary network connection is required for a VPN link to be established.
- What is needed to allow an external client to initiate a communication session with an internal system if the network uses a NAT proxy?
A. IPSec tunnel
B. Static mode NAT
C. Static private IP address
D. Reverse DNS
Answer: B
Static mode NAT is needed to allow an outside entity to initiate communications with an internal system behind a NAT proxy.
- Which of the following VPN protocols do not offer native data encryption? (Choose all that apply.)
A. L2F
B. L2TP
C. IPSec
D. PPTP
Answer: A;B;D
L2F, L2TP, and PPTP all lack native data encryption. Only IPSec includes native data encryption.
- At which OSI model layer does the IPSec protocol function?
A. Data Link
B. Transport
C. Session
D. Network
Answer: D
IPSec operates at the Network layer (layer 3).
- Which of the following is not defined in RFC 1918 as one of the private IP address ranges that are not routed on the Internet?
A. 169.172.0.0–169.191.255.255
B. 192.168.0.0–192.168.255.255
C. 10.0.0.0–10.255.255.255
D. 172.16.0.0–172.31.255.255
Answer: A
The address range 169.172.0.0–169.191.255.255 is not listed in RFC 1918 as a private IP address range. It is, in fact, a public IP address range.
- Which of the following is not a benefit of NAT?
A. Hiding the internal IP addressing scheme
B. Sharing a few public Internet addresses with a large number of internal clients
C. Using the private IP addresses from RFC 1918 on an internal network
D. Filtering network traffic to prevent brute-force attacks
Answer: D
NAT does not protect against or prevent brute-force attacks.
- A significant benefit of a security control is when it goes unnoticed by users. What is this called?
A. Invisibility
B. Transparency
C. Diversion
D. Hiding in plain sight
Answer: B
When transparency is a characteristic of a service, security control, or access mechanism it is unseen by users.
- When you’re designing a security system for Internet-delivered email, which of the following is least important?
A. Nonrepudiation
B. Availability
C. Message integrity
D. Access restriction
Answer: B
Although availability is a key aspect of security in general, it is the least important aspect of security systems for Internet-delivered email.
- Which of the following is typically not an element that must be discussed with end users in regard to email retention policies?
A. Privacy
B. Auditor review
C. Length of retainer
D. Backup method
Answer: D
The backup method is not an important factor to discuss with end users regarding email retention.
- What is it called when email itself is used as an attack mechanism?
A. Masquerading
B. Mail-bombing
C. Spoofing
D. Smurf attack
Answer: B
Mail-bombing is the use of email as an attack mechanism. Flooding a system with messages causes a denial of service.
- Why is spam so difficult to stop?
A. Filters are ineffective at blocking inbound messages.
B. The source address is usually spoofed.
C. It is an attack requiring little expertise.
D. Spam can cause denial-of-service attacks.
Answer: B
It is often difficult to stop spam because the source of the messages is usually spoofed.