Telecommunications and Network Security Flashcards

1
Q
In the OSI reference model, on which layer would ethernet 802.3 be placed?
A. Layer 1 Phyisical
B. Layer 2 Data link
C. Layer 3 Network
D. Layer 4 Transport
A

B. Layer 2 Data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which tactic would best be considered a part of a proactive network defense?
A. redundant firewalls
B. business continuity planning
C. disallowing p2p traffic
D. perimeter surveillance and intelligence gathering

A

D. perimeter surveillance and intelligence gathering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
In which situation is the network not the target of the attack?
A. denial of service
B. hacking into a router
C. virus outbreak
D. man in the middle
A

D. man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following is most effective against a distributed denial of service attack?
A. secret fully qualified domain names
B. redundant network layout
C. traffic filtering
D. NAT
A

C. traffic filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the optimal placement for network based IDS?
A. On the network perimeter, to alert the network administrator of all suspicious traffic
B. On network segments with business critical systems.
C. at the network operations center
D. at an external service provider

A

A. On the network perimeter, to alert the network administrator of all suspicious traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following end-point devices would most likely be considered part of a converged IP network?
A. file server, IP phone, security camera
B. IP phone, thermostat, cypher lock
C. security camera, cypher lock, IP phone
D. thermostat, file server, cypherlock

A

A. file server, IP phone, security camera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is an advantage of fiber-optic over copper cables from a security perspective?
A. fiber optics provides higher bandwidth
B. fiber optics are more difficult to wiretap
C. fiber optics are immune to wiretap
D. none. The two are equivalent; network security is independent from the physical layer.

A

B. fiber optics are more difficult to wiretap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following devices should be part of a network’s perimeter defense?
A. a boundary router, a firewall, a proxy server
B. a firewall, a proxy server, a HIDS
C. a proxy server, a HIDS, a firewall
D. a HIDS, a firewall, a boundary router

A

B. a firewall, a proxy server, a HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following is a principal security risk of wireless LANs?
A. Lack of physical access control
B. demonstrably insecure standards
C. implementation weaknesses
D. war driving
A

A. Lack of physical access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following configurations of a WLAN’s SSID offers adequate security protection?
A. Using an obscure SSID to confuse and distract an attacker.
B. Not using any SSID to all to prevent an attacker from connecting to the network
C. Not broadcasting an SSID to make it harder to detect the WLAN
D. An SSID does not provide protection.

A

D. An SSID does not provide protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPSec
A. provides mechanisms for authentication and encryption.
B. provides mechanisms for nonrepudiation.
C. will only be deployed with IPv6
D. only authenticates clients against a server.

A

A. provides mechanisms for authentication and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A security event management service performs the following function:
A. gathers firewall logs for archiving
B. aggregates logs from security devices and application servers looking for suspicious activity
C. reviews access controls logs on servers and physical entry points to match user system authorization with physical access permissions.
D. Coordination software for security conferences and seminars.

A

B. aggregates logs from security devices and application servers looking for suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is the principal weakness of DNS?
A. lack of authentication of servers and thereby authenticity of records.
B. Its latency, which enables insertion of records between the time when a record has expired and when it is refreshed.
C. The fact that it is simple, distributed, hierarchical database instead of a singular, relation one, thereby giving rise to the possibility of inconsistencies going undetected for a certain amount of time.
D. The fact that addresses in e-mail can be spoofed without checking their validity in DNS, caused by the fact that DNS addresses are not digitally signed.

A

A. lack of authentication of servers and thereby authenticity of records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following statements about open email relays is incorrect?
A. An open email relay is a server that forwards email from domains other than the one it serves.
B. Open email relays are a principal tool for distribution of spam.
C. Using a blacklist of open email relays provides a secure way for an email administrator to identify open mail relays and filter spam.
D. An open email relay is widely considered a bad sign of system administration.

A

C. Using a blacklist of open email relays provides a secure way for an email administrator to identify open mail relays and filter spam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A botnet can be characterized as
A. A network used solely for internal communications
B. an automatic security alerting tool for corporate networks.
C. A group of dispersed, compromised machines controlled remotely for illicit reasons.
D. a type of virus.

A

C. A group of dispersed, compromised machines controlled remotely for illicit reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A mesh network topology is rarely implemented in modern networks due to
A. cost
B. poor redundancy
C. throughput
D. optical fiber limits.
A

A. cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
In installing an 801.11N wireless access point, which of the following provides the strongest wireless encryption?
A. WPA
B. WEP
C. PKI
D WPA2
A

D WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
A new installation requires a network in a heavy manufacturing area with substantial amounts of EMR and power fluctuations.  Which media is best suited for this environment if little traffic degradation is tolerated?
A. Coax
B. wireless
C. shielded twisted pair
D. fiber
A

D. fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Multi-layer protocols such as modbus used in industrial control systems.
A. often have their own encryption and security like IPv6
B. are used in modern routers as a routing interface control
C. are often insecure by their very nature as they were not designed to natively operate over today’s IP networks.
D. have largely been retired and replaced with newer protocols such as IPv6 and netbios.

A

C. are often insecure by their very nature as they were not designed to natively operate over today’s IP networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
A security professional needs to administer a server remotely.  Assuming they can access the server from their location which is the best approach for access?
A. telnet
B. sshv2
C. ftp
D. tftp
A

B. sshv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Layer 2 of the OSI model has two sublayers.  What are those sublayers, and what are two IEEE standards that describe technologies at that layer?
A. LCL and MAC; IEEE 802.2 and 802.3
B. LCL and MAC; IEEE 802.1 and 802.3
C. Network and MAC; IEEE 802.1 and 802.3
D. LLC and MAC; IEEE 802.2 and 802.3
A

D. LLC and MAC; IEEE 802.2 and 802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is not an effective countermeasure against spam?
A. Open mail relay servers
B. Properly configured mail relay servers
C. Filtering on an email gateway
D. Filtering on the client

A

A. Open mail relay servers

23
Q
Robert is responsible for implementing a common architecture used when customers need to access confidential information through Internet connections.  Which of the following best describes this type of architecture?
A. Two tiered model
B. Screened host
C. Three Tiered model
D. Public and private DNS zones
A

C. Three Tiered model

24
Q

Two commonly used networking protocols are TCP and UDP. Which of the following correctly describes the two?
A. TCP provides best effort delivery, and UDP sets up a virtual connection with the destination.
B. TCP provides more services and is more reliable in data transmission whereas UDP takes less resources and overhead to transmit data.
C. TCP provices more services and is more reliable, but UDP provides more security services.
D. TCP is reliable, and UDP deals with flow control and ACKs.

A

B. TCP provides more services and is more reliable in data transmission whereas UDP takes less resources and overhead to transmit data.

25
Q
Which of the following indicates to a packet where to go and how to communicate with the right service or protocol on the destination computer?
A. Socket
B. IP address
C. Port
D. Frame
A

A. Socket

26
Q
Several different tunneling protocols can be used in dial up situations.  Which of the following would be best to use as a VPN tunneling solution?
A. L2P
B. PPTP
C. IPSec
D. L2TP
A

B. PPTP

27
Q

Which of the following correctly describes bluejacking?
A. Bluejacking is a harmful malicious attack
B. It is the process of taking over another portable device via a bluetooth enabled device
C. It is commonly used to send unsolicited contact information
D. The term was coined by the use of a bluetooth device and the act of highjacking another device.

A

C. It is commonly used to send unsolicited contact information

28
Q
DNS is a popular target for attackers due to its strategic role on the Internet.  What type of attack uses recursive queries to poison the cache of a DNS server?
A. DNS spoofing
B. Manipulation of the hosts file
C. Social engineering
D. Domain litigation
A

A. DNS spoofing

29
Q

IP telephony networks require the same security measures as those implemented on an IP data network. Which of the following is unique to IP telephony?
A. Limiting IP sessions going through media gateways
B. Identification of rogue devices
C. Implementation of authentication
D. Encryption of packets containing sensitive information

A

A. Limiting IP sessions going through media gateways

30
Q
Cross site scripting (XSS) is an application security vulnerability usually found in web applications.  What type of vulnerability occurs when a victim is tricked into opening a URL programmed with a rogue script to steal sensitive information?
A. Persistent XSS vulnerability
B. Nonpersistent XSS vulnerability
C. Second order vulnerability
D. DOM based vulnerability
A

B. Nonpersistent XSS vulnerability

31
Q

What are the 3 types of XSS vulnerabilities?

A

Persistent XSS vulnerability
Nonpersistent XSS vulnerability
DOM based vulnerability

32
Q

What is a persistent XSS vulnerabilty?

A

targeted at web sites that allow users to input data that is stored in a database or similar location. The code for this type of attack can be rendered automatically without the need of luring a user to a third party web site.

33
Q

What is another name for persistent XSS vulnerabilty?

A

Second order vulnerability

34
Q

What is another name for a nonpersistent vulnerability?

A

Reflected vulnerability

35
Q

What is a DOM based XSS vulnerability?

A

The DOM environment is used to modify the client side java script.

36
Q
Angela wants to group together computers by department to make it easier for them to share network resources.  Which of the following will allow her to group computers logically?
A. VLAN
B. Open Network Architecture
C. Intranet
D. VAN
A

A. VLAN

37
Q
Both de facto and proprietary interior protocols are in use today.  Which of the following is a proprietary interior protocol that chooses the best path between source and destination?
A. IGRP
B. RIP
C. BGP
D. OSPF
A

A. IGRP

38
Q

Is RIP a proprietary protocol?

A

No

39
Q

What does RIP do?

A

outlines how routers exchange routing table data

Distance vector protocol which calculates shortest distance

40
Q

What does BGP do?

A

Exterior gateway protocol enabling routers to share routing info.

41
Q

Is OSPF proprietary?

A

No

42
Q

What did OSPF replace?

A

RIP

43
Q
Which of the following categories of routing protocols builds a topology database of the network?
A. Dynamic
B. Distance vector
C. Link state
D. Static
A

C. Link state

44
Q

What are the two types of routing protocols?

A

Link state

Distance vector

45
Q

Which of the following does not describe IP telephony security?
A. VoIP networks should be protected with the same security controls used on a data network.
B. Softphones are more secure than IP phones
C. As endpoints, IP phones can become the target of attacks.
D. The current internet architecture over which voice is transmitted is less secure than physical phone lines.

A

B. Softphones are more secure than IP phones

46
Q

When an organization splits naming zones, the names of its hosts that are only accessible from an intranet are hidden from the internet. Which of the following best describes why this is done?
A. To prevent attackers from accessing servers
B. To prevent the manipulation of the hosts file
C. To avoid providing attackers with valuable information that can be used to prepare for an attack
D. To avoid providing attackers with information needed for cyber squatting.

A

C. To avoid providing attackers with valuable information that can be used to prepare for an attack

47
Q

Which of the following best describes why email spoofing is easily executed?
A. SMTP lacks an adequate authentication mechanism
B. Adminstrators often forget to configure an SMTP server to prevent inbound SMTP connections for domains it doesn’t serve
C. Keyword filtering is technically obsolete
D. Blacklists are undependable

A

A. SMTP lacks an adequate authentication mechanism

48
Q
Which of the following is not a benefit of VoIP?
A. Cost
B. Convergence
C. Flexibility
D. Security
A

D. Security

49
Q

Today satellites are used to provide wireless connectivity between different locations. What two prerequisites are needed for two different locations to communicate via satellite links?
A. They must be connected via a phone line and have access to a modem.
B. They must be within a satellite’s line of site and footprint.
C. They must have broadband and a satellite in low Earth orbit
D. They must have a transponder and be within the satellite’s footprint.

A

B. They must be within a satellite’s line of site and footprint.

50
Q

Brad is a security manager at Thingamabobs Inc. He is preparing a presentation for his company’s executives on the risks of using IM and his reasons for wanting to prohibit its use on the company network. Which of the following should not be included in his presentation?
A. Sensitive data and files can be transferred from system to system over IM
B. Users can receive information including malware from an attacker posing as a legitimate sender
C. IM can be stopped by simply blocking specific ports on the network firewalls
D. A security policy is needed specifying IM usage restrictions

A

C. IM can be stopped by simply blocking specific ports on the network firewalls

51
Q
Hanna needs to implement a solution that ensures only authorized devices are allowed access to the company network.  Which of the following IEEE standards was developed for this type of protection?
A. IEEE 802.1AR
B. IEEE 802.1AE
C. IEEE 802.1AF
D. IEEE 802.1XR
A

A. IEEE 802.1AR

52
Q
\_\_\_\_\_\_\_\_\_\_\_ is a set of extensions to DNS to provide DNS clients origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attack types.
A. Resource records
B. Zone transfer
C. DNSSEC
D. Resource transfer
A

C. DNSSEC

53
Q

Which of the following best describes the difference between a virtual firewall that works in bridge mode vs one that is embedded into a hypervisor?
A. Bridge mode virtual firewall allows the firewall to monitor individual traffic links, and hypervisor integration allows the firewall to monitor all activities taking place within a host system.
B. Bridge mode virtual firewall allows the firewall to monitor individual network links, and hypervisor integration allows the firewall to monitor all activities taking place within a guest system.
C. Bridge mode virtual firewall allows the firewall to monitor individual traffic links, and hypervisor integration allows the firewall to monitor all activities taking place within a guest system
D. Bridge mode virtual firewall allows the firewall to monitor individual guest systems, hypervisor integration allows the firewall to monitor all activities taking place within a network system.

A

A. Bridge mode virtual firewall allows the firewall to monitor individual traffic links, and hypervisor integration allows the firewall to monitor all activities taking place within a host system.