CHAPTER 4 - Communication and Network Security Flashcards
1
Q
- How does TKIP provide more protection for WLAN environments?
A. It uses the AES algorithm.
B. It decreases the IV size and uses the AES algorithm.
C. It adds more keying material.
D. It uses MAC and IP filtering.
A
C. The TKIP protocol actually works with WEP by feeding it keying material, which is
data to be used for generating random keystreams. TKIP increases the IV size, ensures it is
random for each packet, and adds the sender’s MAC address to the keying material.
2
Q
- Which of the following is not a characteristic of the IEEE 802.11a standard?
A. It works in the 5-GHz range.
B. It uses the OFDM spread spectrum technology.
C. It provides 52 Mbps in bandwidth.
D. It covers a smaller distance than 802.11b.
A
- C. The IEEE standard 802.11a uses the OFDM spread spectrum technology, works in the
5-GHz frequency band, and provides bandwidth of up to 54 Mbps. The operating range is
smaller because it works at a higher frequency.
3
Q
- Why are switched infrastructures safer environments than routed networks?
A. It is more difficult to sniff traffic since the computers have virtual private connections.
B. They are just as unsafe as nonswitched environments.
C. The data link encryption does not permit wiretapping.
D. Switches are more intelligent than bridges and implement security mechanisms.
A
- A. Switched environments use switches to allow different network segments and/or
systems to communicate. When this communication takes place, a virtual connection is set
up between the communicating devices. Since it is a dedicated connection, broadcast and
collision data are not available to other systems, as in an environment that uses only
bridges and routers.
4
Q
- Which of the following protocols is considered connection-oriented?
A. IP
B. ICMP
C. UDP
D. TCP
A
- D. TCP is the only connection-oriented protocol listed. A connection-oriented protocol
provides reliable connectivity and data transmission, while a connectionless protocol
provides unreliable connections and does not promise or ensure data transmission.
5
Q
- Which of the following can take place if an attacker can insert tagging values into networkand
switch-based protocols with the goal of manipulating traffic at the data link layer?
A. Open relay manipulation
B. VLAN hopping attack
C. Hypervisor denial-of-service attack
D. Smurf attack
A
- B. VLAN hopping attacks allow attackers to gain access to traffic in various VLAN
segments. An attacker can have a system act as though it is a switch. The system
understands the tagging values being used in the network and the trunking protocols, and
can insert itself between other VLAN devices and gain access to the traffic going back and
forth. Attackers can also insert tagging values to manipulate the control of traffic at this
data link layer.
6
Q
- Which of the following proxies cannot make access decisions based upon protocol
commands?
A. Application
B. Packet filtering
C. Circuit
D. Stateful
A
- C. Application and circuit are the only types of proxy-based firewall solutions listed here.
The others do not use proxies. Circuit-based proxy firewalls make decisions based on
header information, not the protocol’s command structure. Application-based proxies are
the only ones that understand this level of granularity about the individual protocols.
7
Q
- Which of the following is a bridge-mode technology that can monitor individual traffic
links between virtual machines or can be integrated within a hypervisor component?
A. Orthogonal frequency division
B. Unified threat management modem
C. Virtual firewall
D. Internet Security Association and Key Management Protocol
A
- C. Virtual firewalls can be bridge-mode products, which monitor individual traffic links
between virtual machines, or they can be integrated within the hypervisor. The hypervisor
is the software component that carries out virtual machine management and oversees guest
system software execution. If the firewall is embedded within the hypervisor, then it can
“see” and monitor all the activities taking place within the one system.
8
Q
- Which of the following shows the layer sequence as layers 2, 5, 7, 4, and 3?
A. Data link, session, application, transport, and network
B. Data link, transport, application, session, and network
C. Network, session, application, network, and transport
D. Network, transport, application, session, and presentation
A
- A. The OSI model is made up of seven layers: application (layer 7), presentation (layer 6),
session (layer 5), transport (layer 4), network (layer 3), data link (layer 2), and physical
(layer 1).
9
Q
- Which of the following technologies integrates previously independent security solutions
with the goal of providing simplicity, centralized control, and streamlined processes?
A. Network convergence
B. Security as a service
C. Unified threat management
D. Integrated convergence management
A
- C. It has become very challenging to manage the long laundry list of security solutions
almost every network needs to have in place. The list includes, but is not limited to,
firewalls, antimalware, antispam, IDS\IPS, content filtering, data leak prevention, VPN
capabilities, and continuous monitoring and reporting. Unified threat management (UTM)
appliance products have been developed that provide all (or many) of these functionalities
in a single network appliance. The goals of UTM are simplicity, streamlined installation
and maintenance, centralized control, and the ability to understand a network’s security
from a holistic point of view.
10
Q
- Metro Ethernet is a MAN protocol that can work in network infrastructures made up of
access, aggregation, metro, and core layers. Which of the following best describes these
network infrastructure layers?
A. The access layer connects the customer’s equipment to a service provider’s aggregation
network. Aggregation occurs on a core network. The metro layer is the metropolitan
area network. The core connects different metro networks.
B. The access layer connects the customer’s equipment to a service provider’s core
network. Aggregation occurs on a distribution network at the core. The metro layer is
the metropolitan area network.
C. The access layer connects the customer’s equipment to a service provider’s aggregation
network. Aggregation occurs on a distribution network. The metro layer is the
metropolitan area network. The core connects different access layers.
D. The access layer connects the customer’s equipment to a service provider’s aggregation
network. Aggregation occurs on a distribution network. The metro layer is the
metropolitan area network. The core connects different metro networks.
A
- D. The access layer connects the customer’s equipment to a service provider’s aggregation
network. Aggregation occurs on a distribution network. The metro layer is the metropolitan
area network. The core connects different metro networks.
11
Q
- Which of the following provides an incorrect definition of the specific component or
protocol that makes up IPSec?
A. Authentication Header protocol provides data integrity, data origin authentication, and
protection from replay attacks.
B. Encapsulating Security Payload protocol provides confidentiality, data origin
authentication, and data integrity.
C. Internet Security Association and Key Management Protocol provides a framework for
security association creation and key exchange.
D. Internet Key Exchange provides authenticated keying material for use with encryption
algorithms.
A
- D. Authentication Header protocol provides data integrity, data origin authentication, and
protection from replay attacks. Encapsulating Security Payload protocol provides
confidentiality, data origin authentication, and data integrity. Internet Security Association
and Key Management Protocol provides a framework for security association creation and
key exchange. Internet Key Exchange provides authenticated keying material for use with
ISAKMP.
12
Q
- Systems that are built on the OSI framework are considered open systems. What does this
mean?
A. They do not have authentication mechanisms configured by default.
B. They have interoperability issues.
C. They are built with internationally accepted protocols and standards so they can easily
communicate with other systems.
D. They are built with international protocols and standards so they can choose what types
of systems they will communicate with.
A
- C. An open system is a system that has been developed based on standardized protocols
and interfaces. Following these standards allows the systems to interoperate more
effectively with other systems that follow the same standards.
13
Q
- Which of the following protocols work in the following layers: application, data link,
network, and transport?
A. FTP, ARP, TCP, and UDP
B. FTP, ICMP, IP, and UDP
C. TFTP, ARP, IP, and UDP
D. TFTP, RARP, IP, and ICMP
A
- C. Different protocols have different functionalities. The OSI model is an attempt to
describe conceptually where these different functionalities take place in a networking stack.
The model attempts to draw boxes around reality to help people better understand the
stack. Each layer has a specific functionality and has several different protocols that can
live at that layer and carry out that specific functionality. These listed protocols work at
these associated layers: TFTP (application), ARP (data link), IP (network), and UDP
(transport).
14
Q
- What takes place at the data link layer?
A. End-to-end connection
B. Dialog control
C. Framing
D. Data syntax
A
C. The data link layer, in most cases, is the only layer that understands the environment in
which the system is working, whether it be Ethernet, Token Ring, wireless, or a connection
to a WAN link. This layer adds the necessary headers and trailers to the frame. Other
systems on the same type of network using the same technology understand only the
specific header and trailer format used in their data link technology.
15
Q
- What takes place at the session layer?
A. Dialog control
B. Routing
C. Packet sequencing
D. Addressing
A
- A. The session layer is responsible for controlling how applications communicate, not how
computers communicate. Not all applications use protocols that work at the session layer,
so this layer is not always used in networking functions. A session layer protocol will set
up the connection to the other application logically and control the dialog going back and
forth. Session layer protocols allow applications to keep track of the dialog.