Communication and Network Security Flashcards
This domain represents 14 percent of the CISSP exam. The Communication and Network Security domain requires a thorough understanding of network fundamentals, secure network design, concepts of network operation, networking technologies and network management techniques.
Q. 1 The purpose of intrusion detection is
To detect attacks and other anomalies Your selection is incorrect To make sure that people aren’t trying to tailgate through security entrances To verify that the honeypot or honeynet is working correctly To detect hacking attempts that the firewall misses
A.
[Communication and Network Security] Intrusion detection identifies intrusion attempts, attacks, and other anomalies on the host or network.
Q. 2 Which of the following are examples of encapsulation protocols? Drag and drop the correct answer(s) from top to bottom. PGP IPSec L2TP SMTP PPP SLIP
IPSec
SLIP
PPP
L2TP
[Communication and Network Security] The Simple Mail Transfer Protocol (SMTP) is used to send email; it is not an encapsulation protocol. Pretty Good Privacy (PGP) is a data encryption program; it is not an encapsulation protocol.
Q. 3 Which of the following cable types is most difficult to tap by eavesdroppers?
Fiber optic UTP Coax STP
Fiber optic
A. [Communication and Network Security] Unshielded twisted pair (UTP), shielded twisted pair (STP), and coax cables all are relatively easy for an eavesdropper to tap. Fiber optic cable is more difficult to tap because it requires specialized equipment to tap light media and the fiber optic cable can be easily damaged, which would make eavesdropping activity easily detectable.
Q. 4 Which of the following are link-state routing protocols? Drag and drop the correct answer(s) from top to bottom.
RIP
BGP
IS-IS
OSPF
IS-IS
OSPF
[Communication and Network Security] Routing Information Protocol (RIP) is a distance vector routing protocol. Border Gateway Protocol (BGP) is distance vector (or path vector) routing protocol.
Q. 5 An access control list is NOT used by
A firewall or screening router to determine which packets should pass through A router to determine which administrative nodes may access it A bastion host to determine which network services should be permitted A client system to record and save passwords
A client system to record and save passwords
D.
[Communication and Network Security] Access control lists (ACLs) commonly are used on firewalls, routers, and bastion hosts. ACLs are not used to save passwords on a computer.
Q. 6 The purpose of a bastion host is to
Be a backup firewall in case the main firewall fails or becomes overloaded Host Internet-facing services Serve as the security management server Serve as the firewall management server
Host Internet-facing services
[Communication and Network Security] A bastion host is used to host Internet-facing services, such as a website or domain name service (DNS) server.
Q. 7 PAP is considered a weak authentication protocol because
It uses a static password that’s not encrypted It uses a changing, but predictable, password that’s not encrypted Its session keys are easily guessed Only the first four characters of the password are significant
It uses a static password that’s not encrypted
[Communication and Network Security] Password Authentication Protocol (PAP) uses a static password that is not encrypted.
Q. 8 Wardriving is the term used to describe
Aggressive driving Sniffing wireless networks to look for vulnerabilities Running multiple concurrent port scanning tools on a system Running Call of Duty™ on a gigabit Ethernet
Sniffing wireless networks to look for vulnerabilities
[Communication and Network Security] War driving is similar to war dialing; an individual uses a wireless mobile device and special software while driving or roaming around looking for vulnerable WiFi networks.
Q. 9 A disadvantage of signature-based intrusion detection is that
It can’t recognize unknown attacks It detects intrusions only on hosts, not on networks It detects intrusions only on networks, not on hosts It can detect only mechanized attacks, not hacker attack
It can’t recognize unknown attacks
[Communication and Network Security] Signature-based IDS only can detect attacks that are defined in its signature file. Therefore, it is of limited effectiveness for zero-day threats.
Q. 10 Operational security issues associated with virtualized environments include which of the following? Drag and drop the correct answer(s) from top to bottom. Keep the correct answers in alphabetical order.
Dynamic DNS Dormant VMs Hypervisor Incompatibility Network Visibilty VM sprawl
Dormant VMs
VM sprawl
Network Visibilty
[Communication and Network Security] The rapid and often unmanaged (uncontrolled) growth of VMs in the data center (VM sprawl), VMs that aren’t actively running and therefore not regularly patched (dormant VMs), and a lack of network visibility to multiple VMs running on a physical host are all operational security issues associated with virtualized environments.
Q. 11 The ping command sends
IGRP Echo Reply packets IGRP Echo Request packets ICMP Echo Request packets UDP Echo Request packets
ICMP Echo Request packets
[Communication and Network Security] Packet Internet Groper (ping) is an Internet Control Message Protocol (ICMP) command that sends Echo Reply packets.
Q. 12 Which of the following are private circuit technologies? Drag and drop the correct answer(s) from top to bottom.
MPLS
E1
T3
xDSL
E1
T3
xDSL
[Communication and Network Security] Multiprotocol label switching (MPLS) is a type of data-carrying technique commonly used on carrier networks. It is not a private circuit technology.
Q. 13 The biggest disadvantage of callback security is
The caller can call only from a predetermined location It only works in networks that support caller ID It’s vulnerable to replay attack It works only in networks that support *69 functionality
The caller can call only from a predetermined location
[Communication and Network Security] Callback security associates a dial-in user with a callback phone number, which requires the caller to call from a predetermined phone number (location).
Q. 14 A security engineer has determined that a Wi-Fi access point uses the WEP protocol and broadcasts its SSID. The best course of action is
Change to WPA2 Turn off broadcast Change to WPA2 and turn off broadcast Add MAC address access control
Change to WPA2 and turn off broadcast
[Communication and Network Security] Implementing the WiFi Protected Access 2 (WPA2) security protocol and turning off SSID broadcasting is the most secure solution.
Q. 15 What’s the purpose of NAT?
To convert a session’s private IP address to a public address To detect spoofed IP packets To counterattack hacking attempts To facilitate court-ordered wiretaps
To convert a session’s private IP address to a public address
[Communication and Network Security] Network Address Translation (NAT) is used to convert private, non-routable IP addresses into routable public IP addresses.
Q. 16 The primary security benefit of a switched LAN versus a shared-media LAN is
Switches don’t transmit spoofed IP packets Broadcast packets are sent only to nodes on the local switch Unlike a shared-media LAN, a network sniffer can’t capture all switched LAN traffic Switches aren’t vulnerable to broadcast storms
Unlike a shared-media LAN, a network sniffer can’t capture all switched LAN traffic
[Communication and Network Security] Traffic on a switched LAN is sent only to the physical switch port associated with the destination node. A shared-media LAN broadcasts traffic across ports.
Q. 17 Which of the following are examples of protocols used to create a VPN? Drag and drop the correct answer(s) from top to bottom.
IPSec L2TP P2P PPTP MAC SSL
IPSec
SSL
PPTP
L2TP
Communication and Network Security] P2P is not a VPN protocol standard; it refers to a point-to-point network connection or a peer-to-peer distributed application architecture. Media access control (MAC) is a physical hardware address, not a VPN protocol standard.