CISSP Q V1.4 DOMAIN 4 Communication and Network Security Flashcards
Which of the following are the correct names for the Open Systems Interconnection (OSI) model layers 1, 6, 7, and 3?
A. Physical, application, presentation, and network B. Data link, network, application, and session
C. Physical, data link, network, and application
D. Physical, presentation, application, and network
D. Physical, presentation, application, and network
Which of the following provides the best and most scalable access control for a corporate wireless network?
A. A Stateful firewall that also does Network Address Translation (NAT).
B. WPA2 Enterprise with IEEE 802.1x.
C. WPA2 Personal with long pre-shared keys.
D. A carefully monitored MAC filtering plan.
B. WPA2 Enterprise with IEEE 802.1x.
The best answer would be (B), as 802.1x could allow for everyone to have an unique username and password. Furthermore, it can support certificates which eliminates the threat of password attacks.
Which statement BEST describes the functions of the data- link layer (DLL) and the presentation layer (PL)?
A. The DLL provides media access control and transmits signals as frames; the PL handles data formatting.
B. The DLL converts port numbers into signals; the PL handles data formatting.
C. The DLL provides framing; the PL converts bits into signals.
D. The DLL converts a network packet into signals; the PL
converts an application packet into a datagram.
A. The DLL provides media access control and transmits signals as frames; the PL handles data formatting.
Which PKI component publishes the Certificate Revocation List (CRL)?
A. The Central Directory (CD)
B. The Registration Authority (RA)
C. The Certificate Authority (CA)
D. The Certificate Manager (CM)
C. The Certificate Authority (CA)
Which of the following technologies acted as a successor to Wired Equivalent Privacy (WEP) without requiring a change in hardware?
A. Wi-Fi Protected Access II (WPA2), and it used the Advanced Encryption Standard (AES).
B. Wi-Fi Protected Access II (WPA2), and it used the Temporal Key Integrity Protocol (TKIP).
C. Wi-Fi Protected Access (WPA) and it used the Temporal Key Integrity Protocol (TKIP).
D. Wi-Fi Protected Access (WPA) and it used the Advanced Encryption Standard (AES).
C. Wi-Fi Protected Access (WPA) and it used the Temporal Key Integrity Protocol (TKIP).
The IEEE standards were WEP, then WPA, then WPA2. The TKIP was first used with WPA and AES was first used in WPA2. WPA2’s support of AES required a change to the hardware.
Which answer best describes the components and purpose of a Content Distribution Network (CDN)?
- A CDN is a large, geographically distributed system of servers.
- CDNs provide content to end users with high availability and high
performance. - CDNs pay content advertisers to deliver their content to the public,
making money on advertisements displayed on their dynamically
generated web pages. - CDN providers are used exclusively for streaming video.
A.1and2
B.2and3
C. 1and4
D. 3and4
A.1and2
What is the MAIN security advantage of installing website control filters to block sites such as Facebook, or fantasy sports sites?
A. Making your employees more productive since they are not wasting time on the blocked social networking sites.
B. Deterring employees from betting on sports events.
C. Stopping leakage of personal information.
D. Avoiding malware.
D. Avoiding malware.
Your company has a border router/firewall to connect its network to the Internet. It also has a 64-port switch to connect all your internal users and printers. To isolate your general users from seeing the normal, but sensitive, traffic among Human Resources (HR) employees, you place the HR employees into a separate VLAN. What risks remain with the use of the VLAN?
A. None, the data is encrypted.
B. None, the data being communication is air gapped.
C. The HR data might be exposed through VLAN leaking.
D. The HR data might be exposed through a denial of service.
C. The HR data might be exposed through VLAN leaking.
802.1Q and Inter-Switch Link Protocol (ISL) Tagging Attacks allow a user on a VLAN to get unauthorized access to another VLAN. This is commonly referred to as “VLAN leaking.”
A hacker sniffs network traffic and then uses a faked IP address and TCP header information to insert packets onto the network. Of the options below, what best illustrates this attack?
A. IP Spoofing
B. Session hijacking C. Fraggle
D. Smurf
B. Session hijacking
This is the classic definition of Session Hijacking. IP spoofing doesn’t typically include the TCP header and Fraggle and Smurf attacks certainly don’t.
An unknown threat actor added a rogue Certificate Authority (CA) to your Public Key Infrastructure (PKI) cache. How would your web browser react?
A. Not trust any of the certificates the rogue CA had signed.
B. Always prompt you to reject it, as the rogue CA’s certificate is
in your browser’s cache.
C. Always trust any certificate the rogue CA had previously
signed.
D. Not cause any harm, as rogue CAs aren’t effective.
C. Always trust any certificate the rogue
Once a CA is in your PKI cache (normally in your browser), any Certificates that the rogue CA has signed will be trusted.
Which attack uses options in the “ping” command to create a denial-of-service attack?
A. An Overlapping fragment attack.
B. The Fraggle attack.
C. The Smurf attack.
D. The Double Teardrop attack.
C. The Smurf attack.
They are describing a Smurf attack! This attack uses ping (ICMP echo replies) to overwhelm a target and cause a DoS. Fraggle is similar but it uses UDP messages instead of ICMP. Answers (A) and (D) are fragmentation attacks.
As the result of a business merger, a root certificate authority from company A and a root certificate authority from company B need to be configured so that they will trust certificates generated by each other. Of the options below would best describe this process?
A. Subordinate CA to Subordinate CA Trust.
B. Cross-certification.
C. RA to RA Cooperation.
D. Certificate Authority Reciprocity.
B. Cross-certification.
Which list contains one IP Networking port number in the “Well known” range, one in the “Registered” range, and one in the “Dynamic” range?
A. 69 1007 and 50001 B. 1443 8080 and 49152
C. 23 80 and 1443
D. 809 1812 and 53652
D. 809 1812 and 53652
Well known – 0 to 1,023; Registered – 1,024 to 49,151, Dynamic/ephemeral – 49,152 to 65,535.
What are the well known port ranges?
Well known – 0 to 1,023;
What are the registered port ranges?
Registered – 1,024 to 49,151