Telecommunications and Network Security Flashcards
In the OSI reference model, on which layer would ethernet 802.3 be placed? A. Layer 1 Phyisical B. Layer 2 Data link C. Layer 3 Network D. Layer 4 Transport
B. Layer 2 Data link
Which tactic would best be considered a part of a proactive network defense?
A. redundant firewalls
B. business continuity planning
C. disallowing p2p traffic
D. perimeter surveillance and intelligence gathering
D. perimeter surveillance and intelligence gathering
In which situation is the network not the target of the attack? A. denial of service B. hacking into a router C. virus outbreak D. man in the middle
D. man in the middle
Which of the following is most effective against a distributed denial of service attack? A. secret fully qualified domain names B. redundant network layout C. traffic filtering D. NAT
C. traffic filtering
What is the optimal placement for network based IDS?
A. On the network perimeter, to alert the network administrator of all suspicious traffic
B. On network segments with business critical systems.
C. at the network operations center
D. at an external service provider
A. On the network perimeter, to alert the network administrator of all suspicious traffic
Which of the following end-point devices would most likely be considered part of a converged IP network?
A. file server, IP phone, security camera
B. IP phone, thermostat, cypher lock
C. security camera, cypher lock, IP phone
D. thermostat, file server, cypherlock
A. file server, IP phone, security camera
Which of the following is an advantage of fiber-optic over copper cables from a security perspective?
A. fiber optics provides higher bandwidth
B. fiber optics are more difficult to wiretap
C. fiber optics are immune to wiretap
D. none. The two are equivalent; network security is independent from the physical layer.
B. fiber optics are more difficult to wiretap
Which of the following devices should be part of a network’s perimeter defense?
A. a boundary router, a firewall, a proxy server
B. a firewall, a proxy server, a HIDS
C. a proxy server, a HIDS, a firewall
D. a HIDS, a firewall, a boundary router
B. a firewall, a proxy server, a HIDS
Which of the following is a principal security risk of wireless LANs? A. Lack of physical access control B. demonstrably insecure standards C. implementation weaknesses D. war driving
A. Lack of physical access control
Which of the following configurations of a WLAN’s SSID offers adequate security protection?
A. Using an obscure SSID to confuse and distract an attacker.
B. Not using any SSID to all to prevent an attacker from connecting to the network
C. Not broadcasting an SSID to make it harder to detect the WLAN
D. An SSID does not provide protection.
D. An SSID does not provide protection.
IPSec
A. provides mechanisms for authentication and encryption.
B. provides mechanisms for nonrepudiation.
C. will only be deployed with IPv6
D. only authenticates clients against a server.
A. provides mechanisms for authentication and encryption.
A security event management service performs the following function:
A. gathers firewall logs for archiving
B. aggregates logs from security devices and application servers looking for suspicious activity
C. reviews access controls logs on servers and physical entry points to match user system authorization with physical access permissions.
D. Coordination software for security conferences and seminars.
B. aggregates logs from security devices and application servers looking for suspicious activity
Which of the following is the principal weakness of DNS?
A. lack of authentication of servers and thereby authenticity of records.
B. Its latency, which enables insertion of records between the time when a record has expired and when it is refreshed.
C. The fact that it is simple, distributed, hierarchical database instead of a singular, relation one, thereby giving rise to the possibility of inconsistencies going undetected for a certain amount of time.
D. The fact that addresses in e-mail can be spoofed without checking their validity in DNS, caused by the fact that DNS addresses are not digitally signed.
A. lack of authentication of servers and thereby authenticity of records.
Which of the following statements about open email relays is incorrect?
A. An open email relay is a server that forwards email from domains other than the one it serves.
B. Open email relays are a principal tool for distribution of spam.
C. Using a blacklist of open email relays provides a secure way for an email administrator to identify open mail relays and filter spam.
D. An open email relay is widely considered a bad sign of system administration.
C. Using a blacklist of open email relays provides a secure way for an email administrator to identify open mail relays and filter spam.
A botnet can be characterized as
A. A network used solely for internal communications
B. an automatic security alerting tool for corporate networks.
C. A group of dispersed, compromised machines controlled remotely for illicit reasons.
D. a type of virus.
C. A group of dispersed, compromised machines controlled remotely for illicit reasons.
A mesh network topology is rarely implemented in modern networks due to A. cost B. poor redundancy C. throughput D. optical fiber limits.
A. cost
In installing an 801.11N wireless access point, which of the following provides the strongest wireless encryption? A. WPA B. WEP C. PKI D WPA2
D WPA2
A new installation requires a network in a heavy manufacturing area with substantial amounts of EMR and power fluctuations. Which media is best suited for this environment if little traffic degradation is tolerated? A. Coax B. wireless C. shielded twisted pair D. fiber
D. fiber
Multi-layer protocols such as modbus used in industrial control systems.
A. often have their own encryption and security like IPv6
B. are used in modern routers as a routing interface control
C. are often insecure by their very nature as they were not designed to natively operate over today’s IP networks.
D. have largely been retired and replaced with newer protocols such as IPv6 and netbios.
C. are often insecure by their very nature as they were not designed to natively operate over today’s IP networks.
A security professional needs to administer a server remotely. Assuming they can access the server from their location which is the best approach for access? A. telnet B. sshv2 C. ftp D. tftp
B. sshv2
Layer 2 of the OSI model has two sublayers. What are those sublayers, and what are two IEEE standards that describe technologies at that layer? A. LCL and MAC; IEEE 802.2 and 802.3 B. LCL and MAC; IEEE 802.1 and 802.3 C. Network and MAC; IEEE 802.1 and 802.3 D. LLC and MAC; IEEE 802.2 and 802.3
D. LLC and MAC; IEEE 802.2 and 802.3