Domain 4 - Communications & Network Security Flashcards

1
Q
  1. In the OSI reference model, on which layer can Ethernet (IEEE 802.3)

A. Layer 1 - Physical layer
B. Layer 2 - Data-link layer
C. Layer 3 - Network layer
D. Layer 4 - Transport layer

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. A customer wants to keep cost to a minimum and has only ordered a single static IP address from the ISP. Which of the following must be configured on the router to allow for all the computers to share the same public IP address?

A. VLANs
B. PoE
C. PAT
D. VPN

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Users are reporting that some Internet websites Are not accessible anymore. Which of the following will allow the network administrator to quickly isolate the remote router that is causing the network communication issue, so that the problem can be reported to the appropriate responsible party?

A. Ping
B. Protocol analyzer
C. Tracert
D. Dig

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Ann installs a new Wireless Access Point (WAP) and users are able to connect to it. However, once connected, users cannot access the Internet. Which of the following is the MOST likely cause of the problem?

A. The signal strength has been degraded and latency is increasing hop count.
B. An incorrect subnet mask has been entered in the WAP configuration.
C. The signal strength has been degraded and packets are being lost.
D. Users have specified the wrong encryption type and packets are being rejected.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What is the optimal placement for network-based intrusion detection systems (NIDS)?

A. On the network perimeter, to alert the network administrator of all suspicious traffic
B. On network segments with business-critical systems (e.g., demilitarized zones (DMZs) and on certain intranet segments)
C. At the network operations center (NOC)
D. At an external service provider

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following end-point devices would MOST likely be considered part of a converged IP network?

A. file server, IP phone, security camera
B. IP phone, thermostat, cypher lock
C. security camera, cypher lock, IP phone
D. thermostat, file server cypher lock

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?

A. Content filtering
B. Port filtering
C. MAC filtering
D. IP filtering

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following devices should be part of a network’s perimeter defense?

A. A boundary router, A firewall, A proxy Server
B. A firewall, A proxy server, A host based intrusion detection system (HIDS)
C. A proxy server, A host based intrusion detection system (HIDS), A firewall
D. A host based intrusion detection system (HIDS), A firewall, A boundary router

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which of the following is a principal security risk of wireless LAN’s

A. Lack of physical access control
B. Demonstrably insecure standards
C. Implementation weaknesses
D. War driving

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which of the following is a path vector routing protocol?

A. RIP
B. EIGRP
C. OSPF/IS-IS
D. BGP

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. It can be said that IPSec:

A. Provides mechanisms for authentication and encryption.
B. provides mechanisms for nonrepudiation.
C. will only be deployed with IPv6.
D. Only authenticates clients against a server.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. A security Event Management (SEM) service performs the following function:

A. Gathers firewall logs for archiving
B. Aggregates logs from security devices and application servers looking for suspicious activity
C. Reviews access controls logs on servers and physical entry points to match user system authorization with physical access permissions
D. Coordination software for security conferences and seminars.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Which of the following is the principal weakness of DNS (Domain Name System)?

A. Lack of authentication of servers, and thereby authenticity of records
B. Its latency, which enables insertion of records between the time when a record has expired and when it is refreshed
C. The fact that it is a simple, distributed, hierarchical database instead of a singular, relational one, thereby giving rise to the possibility of inconsistencies going undetected for a certain amount of time
D. The fact that addresses in e-mail can be spoofed without checking their validity in DNS, caused by the fact that DNS addresses are not digitally signed

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which of the following statements about open e-mail relays is incorrect?

A. An open e-mail relay is a server that forwards e-mail from domains other than the ones it serves.
B. Open e-mail relays are a principal tool for distribution of spam.
C. Using a blacklist of open e-mail relays provides a secure way for an e-mail administrator to identify open mail relays and filter spam.
D. An open e-mail relay is widely considered a sign of bad system administration.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. A botnet can be characterized as:

A. An network used solely for internal communications
B. An automatic security alerting tool for corporate networks
C. A group of dispersed, compromised machines controlled remotely for illicit reasons.
D. A type of virus

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. During a disaster recovery test, several billing representatives need to be temporarily setup to take payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario?

A. WPA2, SSID enabled and 802.11 n.
B. WEP, SSID enabled, and 802.11b.
C. WEP, SSID disabled, and 802.11g.
D. WPA2, SSID disabled, and 802.11a.

A

D

17
Q
  1. Which xDSL flavor delivers both downstream and upstream speeds of 1.544 MBps over two copper twisted pairs?

A. HDSL
B. SDSL
C. ADSL
D. VDSL

A

A

18
Q
  1. A new installation requires a network in a heavy manufacturing area with substantial amounts of electromagnetic radiation and power fluctuations. Which media is best suited for this environment if little traffic degradation is tolerated?

A. Coax cable
B. Wireless
C. Shielded twisted pair
D. Fiber

A

D

19
Q
  1. Multi-layer protocols such as Modbus used in industrial control systems…

A. often have their own encryptions and security like IPv6
B. are used in modern routers as a routing interface control
C. are often insecure by their very nature as they were not designed to natively operate over today’s IP networks
D. Have largely been retired and replaced with newer protocols such as IPv6 and NetBIOS

A

C

20
Q
  1. Frame Relay and X.25 networks are part of which of the following?

A. Circuit-switched services
B. Cell-switched services
C. Packet-switched services
D. Dedicated digital services

A

C