Domain 4 - Communications & Network Security Flashcards
- In the OSI reference model, on which layer can Ethernet (IEEE 802.3)
A. Layer 1 - Physical layer
B. Layer 2 - Data-link layer
C. Layer 3 - Network layer
D. Layer 4 - Transport layer
B
- A customer wants to keep cost to a minimum and has only ordered a single static IP address from the ISP. Which of the following must be configured on the router to allow for all the computers to share the same public IP address?
A. VLANs
B. PoE
C. PAT
D. VPN
C
- Users are reporting that some Internet websites Are not accessible anymore. Which of the following will allow the network administrator to quickly isolate the remote router that is causing the network communication issue, so that the problem can be reported to the appropriate responsible party?
A. Ping
B. Protocol analyzer
C. Tracert
D. Dig
C
- Ann installs a new Wireless Access Point (WAP) and users are able to connect to it. However, once connected, users cannot access the Internet. Which of the following is the MOST likely cause of the problem?
A. The signal strength has been degraded and latency is increasing hop count.
B. An incorrect subnet mask has been entered in the WAP configuration.
C. The signal strength has been degraded and packets are being lost.
D. Users have specified the wrong encryption type and packets are being rejected.
B
- What is the optimal placement for network-based intrusion detection systems (NIDS)?
A. On the network perimeter, to alert the network administrator of all suspicious traffic
B. On network segments with business-critical systems (e.g., demilitarized zones (DMZs) and on certain intranet segments)
C. At the network operations center (NOC)
D. At an external service provider
A
- Which of the following end-point devices would MOST likely be considered part of a converged IP network?
A. file server, IP phone, security camera
B. IP phone, thermostat, cypher lock
C. security camera, cypher lock, IP phone
D. thermostat, file server cypher lock
A
- Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?
A. Content filtering
B. Port filtering
C. MAC filtering
D. IP filtering
B
- Which of the following devices should be part of a network’s perimeter defense?
A. A boundary router, A firewall, A proxy Server
B. A firewall, A proxy server, A host based intrusion detection system (HIDS)
C. A proxy server, A host based intrusion detection system (HIDS), A firewall
D. A host based intrusion detection system (HIDS), A firewall, A boundary router
A
- Which of the following is a principal security risk of wireless LAN’s
A. Lack of physical access control
B. Demonstrably insecure standards
C. Implementation weaknesses
D. War driving
A
- Which of the following is a path vector routing protocol?
A. RIP
B. EIGRP
C. OSPF/IS-IS
D. BGP
D
- It can be said that IPSec:
A. Provides mechanisms for authentication and encryption.
B. provides mechanisms for nonrepudiation.
C. will only be deployed with IPv6.
D. Only authenticates clients against a server.
A
- A security Event Management (SEM) service performs the following function:
A. Gathers firewall logs for archiving
B. Aggregates logs from security devices and application servers looking for suspicious activity
C. Reviews access controls logs on servers and physical entry points to match user system authorization with physical access permissions
D. Coordination software for security conferences and seminars.
B
- Which of the following is the principal weakness of DNS (Domain Name System)?
A. Lack of authentication of servers, and thereby authenticity of records
B. Its latency, which enables insertion of records between the time when a record has expired and when it is refreshed
C. The fact that it is a simple, distributed, hierarchical database instead of a singular, relational one, thereby giving rise to the possibility of inconsistencies going undetected for a certain amount of time
D. The fact that addresses in e-mail can be spoofed without checking their validity in DNS, caused by the fact that DNS addresses are not digitally signed
A
- Which of the following statements about open e-mail relays is incorrect?
A. An open e-mail relay is a server that forwards e-mail from domains other than the ones it serves.
B. Open e-mail relays are a principal tool for distribution of spam.
C. Using a blacklist of open e-mail relays provides a secure way for an e-mail administrator to identify open mail relays and filter spam.
D. An open e-mail relay is widely considered a sign of bad system administration.
C
- A botnet can be characterized as:
A. An network used solely for internal communications
B. An automatic security alerting tool for corporate networks
C. A group of dispersed, compromised machines controlled remotely for illicit reasons.
D. A type of virus
C