CISSP: Telecommunications and Network Security Flashcards
- The process of wrapping protocol information from one layer in the data section of another layer describes
A. Data encryption
B. Data encapsulation
C. Data hiding
D. TCP wrappers
B. Data encapsulation
Data encapsulation wraps protocol information from one layer in the data section of another layer. The other choices are incorrect. Review “The OSI Reference Model.”
- A data network that operates across a relatively large geographic area defines what type of network?
A. LAN
B. MAN
C. CAN
D. WAN
D. WAN
A LAN operates across a relatively small geographic area. MANs and CANs are LAN variations. Review “Wide area network (WAN).”
- The LLC and MAC are sub-layers of what OSI model layer?
A. Data Link
B. Network
C. Transport
D. Session
A. Data Link
The Data Link Layer is the only layer of the OSI model that defines sub-layers (the Logical Link Control and Media Access Control sub-layers). Review “Data Link Layer (Layer 2).”
- The Ethernet protocol is defined at what layer of the OSI model and in which IEEE standard?
A. Data Link Layer, 802.3
B. Network Layer, 802.3
C. Data Link Layer, 802.5
D. Network Layer, 802.5
A. Data Link Layer, 802.3
LAN protocols are defined at the Data Link Layer. IEEE 802.5 defines the Token-Ring standard. Review “Data Link Layer (Layer 2).”
- All the following are examples of packet-switched WAN protocols, except
A. X.25
B. Frame Relay
C. ISDN
D. SMDS
C. ISDN
ISDN is circuit-switched. Packet-switched network technologies include X.25, Frame Relay, SMDS, ATM, and VoIP. Review “WAN technologies and protocols.”
- Which of the following is an example of a Class C IP address?
A. 17.5.5.1
B. 127.0.0.1
C. 192.167.4.1
D. 224.0.0.1
C. 192.167.4.1
17.5.5.1 is a Class A address, 127.0.0.1 is an interface loopback address, and 224.0.0.1 is a multicast address (Class D). Review “Internet Protocol (IP).”
- The TCP/IP Protocol Model consists of the following four layers:
A. Application, Presentation, Session, Transport
B. Application, Session, Network, Physical
C. Application, Session, Transport, Internet
D. Application, Transport, Internet, Link
D. Application, Transport, Internet, Link (or Network)
Review “The TCP/IP Model.”
- Which of the following firewall architectures employs external and internal routers, as well as a bastion host?
A. Screening router
B. Screened-subnet
C. Screened-host gateway
D. Dual-homed gateway
B. Screened-subnet
The screened-subnet employs an external screening router, a dual-homed (or multi-homed) host, and a second internal screening router. Review “Firewall architectures.”
- Which of the following is not a common VPN protocol standard?
A. IPSec
B. PPTP
C. TFTP
D. L2TP
C. TFTP
TFTP is the Trivial File Transfer Protocol, a basic variation of the FTP protocol that provides limited file transfer capabilities. It has absolutely nothing to do with VPNs. Review “Virtual Private Networks (VPNs).”
- A type of network attack in which TCP packets are sent from a spoofed source address with the SYN bit set describes
A. Smurf
B. Fraggle
C. Teardrop
D. SYN flood
D. SYN flood
Smurf attacks exploit vulnerabilities in the ICMP protocol. Fraggle attacks exploit vulnerabilities in the UDP protocol. A Teardrop attack exploits vulnerabilities in the TCP protocol by using the length and fragmentation offset fields. See “Network Attacks and Countermeasures.”
Which of the following devices does NOT operate at Layer 2, the Data Link layer?
a. Hub
b. Switch
c. Wireless access point
d. Bridge
A. The hub operates at Layer 1, the Physical layer of the OSI Model.
Which organization developed and publishes the OSI Model?
a. IEEE
b. ISO
c. IANA
d. IETF
B. The International Organization for Standardization developed and publishes the OSI Model.
Which of the following protocols operates at Layer 4, and provides best-effort, connectionless delivery of segments?
a. ARP
b. IGMP
c. TCP
d. UDP
D. User Datagram Protocol (UDP) operates at Layer 4, the Transport layer of the OSI Model. UDP is a best-effort, connectionless delivery service.
Data and header information being processed at Layer 3, the Network layer of the OSI Model, is called which of the following?
a. Packet
b. Data stream
c. Frame
d. Segment
A. Data and header information being processed at Layer 3, the Network layer of the OSI Model, is called a packet.
Which of the following places the layers of the OSI Model in the correct order when processing inbound data from the network media?
a. Application, Physical, Session, Transport, Network, Data Link, Physical
b. Physical, Transport, Network, Data Link, Presentation, Session, Application
c. Application, Session, Presentation, Transport, Network, Data Link, Physical
d. Physical, Data Link, Network, Transport, Session, Presentation, Application
D. The correct order of the layers of the OSI Model that process inbound data from the network media is: Physical, Data Link, Network, Transport, Session, Presentation, Application.