Chapter 12 – Secure Communications and Network Attacks Flashcards

1
Q
  1. ________ is a layer 2 connection mechanism that uses packet-switching technology to establish virtual circuits between the communication endpoints.
    Frame relay
A

Frame relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Tunnel connections can be established over all except for which of the following?
    Stand-alone systems
A

Stand-alone systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. ______ is a standards-based mechanism for providing encryption for point-to-point TCP/IP traffic.
    IPsec
A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following IP address is not a private IP address as defined by RFC 1918?
  2. 254.1.119
A

169.254.1.119

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which of the following cannot be linked over VPN?

Two systems without an intermediary network connection

A

Two systems without an intermediary network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What is needed to allow an external client to initiate a communication session with an internal system if the network uses a NAT proxy?
    Static model NAT
A

Static model NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which of the following VPN protocols do not offer native data encryption (Choose all that apply.)
    L2F,L2TP,PPTP
A

L2F,L2TP,PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. At which OSI model layer does the IPsec protocol function?
    Network
A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What technology allows for phone conversations to occur over an existing TCP/IP network and internet connection?
    VoIP
A

VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which of the following is not a benefit of NAT?

Filtering network traffic to prevent brute-force attacks

A

Filtering network traffic to prevent brute-force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly