Telecommunications, Network, and Internet Security Flashcards
Frame-relay uses a public switched network to provide:
A. Local Area Network (LAN) connectivity
B. Metropolitan Area Network (MAN) connectivity
C. Wide Area Network (WAN) connectivity
D. World Area Network (WAN) connectivity
Answer: C
Explanation:
Which of the following technologies has been developed to support TCP/IP networking over low speed serial interfaces? A. ISDN B. SLIP C. xDSL D. T1
Answer: B
Explanation: SLIP, Serial Line IP, is a currently a de facto standard, commonly used for point-to-point serial connections running TCP/IP.
Reference: http://tools.ietf.org/html/rfc1055
Which of the following provide network redundancy in a local network environment? A. Mirroring B. Shadowing C. Dual backbones D. Duplexing
Answer: C
Explanation:
Which of the following is a Wide Area Network that was originally funded by the Department of Defense, which uses TCP/IP for data interchange? A. the Internet B. the Intranet C. the Extranet D. The Ethernet
Answer: A
Explanation:
Internet specifically refers to the global network of:
A. public networks and Internet Service Providers (ISPs) throughout the world
B. private networks and Internet Services Providers (ISPs) through the world
C. limited networks and Internet Service Providers (ISPs) throughout the world
D. point networks and Internet Service Providers (ISPs) throughout the world
Answer: A
Explanation:
To improve the integrity of asynchronous communications in the realm of personal computers, the Microcom Networking Protocol (MNP) uses a highly effective communications error-control technique known as A. Cyclic redundancy check. B. Vertical redundancy check. C. Checksum. D. Echoplex.
Answer: D
Explanation:
Organizations should consider which of the following first before connecting their LANs to the Internet?
A. plan for implementing W/S locking mechanisms
B. plan for protecting the modem pool
C. plan for providing the user with his account usage information
D. plan for considering all authentication options
Answer: D
Explanation:
Which xDSL flavour delivers both downstream and upstream speeds of 1.544 Mbps over two copper twisted pairs? A. HDSL B. SDSL C. ADSL D. VDSL
Answer: A
Explanation: HDSL – High-Data-Rate Digital Subscriber Line – 1.544 Mbps each way over 2 copper twisted pair (http://www.cisco.com/en/US/tech/tk175/tk318/tsd_technology_support_protocol_home.html)
Which of the following statements pertaining to Asynchronous Transfer Mode (ATM) is false? A. It can be used for voice B. It can be used for data C. It carries various sizes of packets D. It can be used for video
Answer: C
Explanation: “Asynchronous transfer mode (ATM) is a cell-switching technology, as opposed to a packet-switching technology like Frame Relay. ATM uses virtual circuits much like Frame Relay, but because it uses fixed-size frames or cells, it can guarantee throughput. This makes ATM an excellent WAN technology for voice and video conferencing.” Pg 87 Tittel: CISSP Study Guide
Satellite communications are easily intercepted because__
A. transmissions are continuous 24 hours per day.
B. a satellite footprint is narrowly focused.
C. a satellite footprint is very large.
D. a satellite footprint does not change.
Answer: C
Explanation: I think it may have to do with the footprint of the satellite. Footprint - The area of Earth with sufficient antenna gain to receive a signal from a satellite. http://www.aero.org/publications/crosslink/winter2002/backpage.html
Not A: Granted Satellites transmit but they may not do it 24x7 a
Which one of the following protocols CANNOT be used for full duplex Wide Area Network (WAN) communications? A. Synchronous Data Link Control (SDLC) B. Serial Line Internet Protocol (SLIP) C. Point-to-Point Protocol (PPP) D. High-Level Data Link Control (HDLC)
Answer: B
Explanation: By exclusion SLIP is the correct answer.
Note: Serial Line Internet Protocol (SLIP) is an older technology developed to support TCP/IP communications over asynchronous serial connections, such as serial cables or modem dial-up. Pg 96. Tittel: CISSP Study Guide. SLIP is serial protocol opposed to WAN protocol.
Not SDLC: SDLC is full duplex. “SDLC was developed to enable mainframes to communicate with remote locations.” Pg 456 Shon Harris CISSP Certification Exam Guide. This is a WAN protocol.
Not C. “PPP is a full-duplex protocol that provides bi-directional links over synchronous, asynchronous, ISDN, frame relay and SONET connections.” Pg. 472 Shon Harris CISSP All-In-One Certification Exam Guide. PPP is full-duplex.
Not D. “HDLC is an extension of SDLC, which is mainly used in SNA environments. HDLC provides high throughput because it supports full-duplex transmissions and is used in point-to-point and multipoint connections.” Pg 456 Shon Harris CISSP All-In-One Certification Exam Guide. PPP is full-duplex.
Fast ethernet operates at which of the following? A. 10 Mbps B. 100 Mbps C. 1000 Mbps D. All of the above
Answer: B
Explanation: “Fast Ethernet 100Mbps – IEE 802.3u” pg 810 Shon Harris CISSP All-In-One Exam Guide
Which of the following statements about the “Intranet” is NOT true?
A. It is an add-on to a local area network.
B. It is unrestricted and publicly available.
C. It is usually restricted to a community of users
D. it can work with MANS or WANS
Answer: B
Explanation: “An intranet is a ‘private’ network that uses Internet technologies, such as TCP/IP. The company has Web servers and client machines using Web browsers, and it uses the TCP/IP protocol suite. The Web pages are written in Hypertext Markup Language (HTML) or Extensible Markup Language (XML) and are accessed via HTTP.” Pg 395 Shon Harris: All-In-One CISSP Certification Guide.
Frame relay and X.25 networks are part of which of the following? A. Circuit-switched services B. Cell-switched services C. Packet-switched services D. Dedicated digital services
Answer: C
Explanation: Packet-Switched Technologies: X.25 Link Access Procedure-Balanced (LAPB) Frame Relay Switched Multimegabit Data Service (SMDS) Asynchronous Transfer Mode (ATM) Voice over IP (VoIP)
A Wide Area Network (WAN) may be privately operated for a specific user community, may support multiple communication protocols, or may provide network connectivity and services via:
A. interconnected network segments (extranets, intranets, and Virtual Private Networks)
B. interconnected network segments (extranets, internets, and Virtual Private Networks)
C. interconnected netBIOS segments (extranets, intranets, and Virtual Private Networks)
D. interconnected NetBIOS segments (extranets, interest, and Virtual Private Networks)
Answer: A Explanation:
What is the proper term to refer to a single unit of Ethernet data? A. Ethernet segment B. Ethernet datagram C. Ethernet frame D. Ethernet packet
Answer: C
Explanation: When the Ethernet software receives a datagram from the Internet layer, it performs the following steps: 1.) Breaks IP layer data into smaller chunks if necessary which will be in the data field of ethernet frames. Pg. 40 Sams Teach Yourself TCP/IP in 24 hrs.
Which of the following is a LAN transmission protocol? A. Ethernet B. Ring Topology C. Unicast D. Polling
Answer: C
Reference: “LAN Transmission Methods. LAN data is transmitted from the sender to one or more receiving stations using either a unicast, multicast, or broadcast transmission.” pg 528 Hansche: Official (ISC)2 Guide to the CISSP Exam
Which of the following access methods is used by Ethernet? A. CSMA/CD B. CSU/DSU C. TCP/IP D. FIFO
Answer: A
Explanation: “Under the Ethernet CSMA/CD media-access process, any computer on a CSMA/CD LAN can access the network at any time.” Pg. 103 Krutz: The CISSP Prep Guide.
Which one of the following data transmission technologies is NOT packet-switch based?
A. X.25
B. ATM (Asynchronous Transfer Mode)
C. CSMA/CD (Carrier Sense Multiple Access/Collision Detection)
D. Frame Relay
Answer: B
Explanation: “Examples of packet-switching networks are X.25, Link Access Procedure-Balanced (LAPB),
ISC CISSP Exam
“Pass Any Exam. Any Time.” - www.actualtests.com 394
Frame Relay, Switched Multimegabit Data Systems (SMDS), Asynchronous Transfer Mode (ATM), and Voice over IP (VoIP).” Pg 146 Krutz: CISSP Prep Guide: Gold Edition. http://en.wikipedia.org/wiki/Virtual_circuit
Unshielded (UTP) does not require the fixed spacing between connections that is:
A. necessary with telephone-type connections
B. necessary with coaxial-type connections
C. necessary with twisted pair-type connections
D. necessary with fiber optic-type connections
Answer: B
Explanation: “Fixed spacing between connections” is referring to the fixed-sized insulation that separates the inner wire from the shielding.
What type of cable is used with 100Base-TX Fast Ethernet?
A. Fiber-optic cable
B. Four pairs of Category 3, 4, or 5 unshielded twisted-pair (UTP) wires.
C. Two pairs of Category 5 unshielded twisted-pair (UTP) or Category 1 shielded twisted-pair (STP) wires
D. RG-58 Cable
Answer: C
Explanation:
Which cable technology refers to the CAT 3 and Cat5 Categories? A. Coaxial cables B. Fiber Optic cables C. Axial cables D. Twisted Pair cables
Answer: D
Explanation:
On which Open System Interconnection (OSI) Reference Model layer are repeaters used as communications transfer devices? A. Data-link B. Physical C. Network D. Transport
Answer: B
Explanation: This original answer is wrong (network) repeater is physical layer. Repeaters just regenerates the signal “Hubs are multi port repeaters, and as such they obey the same rules as repeaters (See previous section OSI Operating Layer). They operate at the OSI Model Physical Layer.” http://www.thelinuxreview.com/howto/intro_to_networking/c5434.htm
In the OSI/ISO model, at what layer are some of the SLIP, CSLIP, PPP, control functions are provided? A. Data Link B. Transport C. Presentation D. Application
Answer: A
Explanation:
In the OSI/ISO model, at what level are TCP and UDP provided? A. Transport B. Network C. Presentation D. Application
Answer: A
Explanation: Transport Layer. …. TCP and UDP operate on this layer.’ Pg 82. Krutz: The CISSP Prep Guide.
DNS, FTP, TFTP, SNMP are provided at what level of the OSI/ISO model? A. Application B. Network C. Presentation D. Transport
Answer: A
Explanation:
Which of the following OSI layers does not provide confidentiality? A. Presentation B. Network C. Transport D. Session
Answer: C Explanation: 1. Reference: “[Network Layer] The routing protocols are located at this layer and include the following: …..Internet Protocol Security (IPSec)”. “The following protocols operate within the Session layer: Secure Sockets Layer (SSL)”. “The Presentation layer is also responsible for encryption and compression.” Pg 61-62 Tittel: CISSP Study Guide 2. According to this chart: http://en.wikipedia.org/wiki/OSI_model Network - IPSEC Presentation – SSL/TLS Session – L2TP Transport – remains an answer. 3. According to Shon Harris / CISSP 5th edition, SSL is at the TRANSPORT layer Conclusion: So, 3 different sources put SSL at 3 completely different layers. But using 1 of the 2 sources does get you with ‘transport’ as being the answer.
Which of the following OSI layers provides routing and related services? A. Network B. Presentation C. Session D. Physical
Answer: A
Explanation:
The International Standards Organization/Open Systems Interconnection (ISO/OSI) Layers does NOT have which of the following characteristics?
A. Standard model for network communications
B. Used to gain information from network devices such as count of packets received and routing tables
C. Allows dissimilar networks to communicate
D. Defines 7 protocol layers (a.k.a. protocol stacks)
Answer: B
Explanation: Not A. “The Open System Interconnect (OSI) is a worldwide federation that works to provide international standards. “ Not C. “A protocol is a standard set of rules that determine how systems will communicate across networks. Two different systems can communicate and understand each other because they use the same protocols in spite of their differences.” Pg. 343-344 Shon Harris: CISSP All-In-One Certification Exam Guide
Which of the following layers supervises the control rate of packet transfers in an Open Systems Interconnections (OSI) implementation? A. Physical B. Session C. Transport D. Network
Answer: C
Explanation: The transport layer defines how to address the physical locations and /or devices on the network, how to make connections between nodes, and how to handle the networking of messages. It is responsible for maintaining the end-to-end integrity and control of the session.
Services located in the transport layer both segment and reassemble the data from upper-layer applications and unite it onto the same data stream, which provides end-to-end data transport services and establishes a logical connection between the sending host and destination host on a network. The transport layer is also responsible for providing mechanisms for multiplexing upperlayer applications, session establishment, and the teardown of virtual circuits. -Ronald Krutz The CISSP PREP Guide (gold edition) pg 275-276
“Transport Layer The agreement on these issues before transferring data helps provide more reliable data transfer, error detection and correction, and flow control and it optimizes network services needed to perform these tasks.” Pg. 318 – 319 Shon Harris: All-In-One CISSP Certification Guide.
Which Open Systems Interconnect (OSI) layers provide Transport Control Protocol/Internet Protocol (TCP/IP) end-to-end security? A. Application and presentation B. Presentation and session C. Network and application D. Application and transport
Answer: B
Explanation: “The Session layer (layer 5) is responsible for establishing, maintaining, and terminating communication sessions between two computers. The primary technology within layer 5 is a gateway. The following protocols operate within the Session layer: Secure Sockets Layer (SSL)
Network File System (NFS)
Structured Query Language (SQL)
Remote Procedure Call (RPC)
The presentation layer (layer 6) is responsible for transforming data received from the application layer into a format that any system following the OSI model can understand. It imposes common or standardized structure and formatting rules onto the data. The Presentation layer is also responsible for encryption and compression.” Pg. 79-80 Tittel: CISSP Study Guide.
Which one of the following is a TRUE statement about the bottom three layers of the Open Systems Interconnection (OSI) Reference Model?
A. They generally pertain to the characteristics of the communicating end systems.
B. They cover synchronization and error control of network data transmissions.
C. They support and manage file transfer and distribute process resources.
D. They support components necessary to transmit network messages.
Answer: D
Explanation: By exclusion: Not A.
“The Session layer (layer 5) is responsible for establish, maintaining, and terminating communication sessions between two computers.” Pg 79 Tittel: CISSP Study Guide.
Not B.
“The Transport layer (layer 4) ….This layer includes mechanisms for segmentation, sequencing, error checking, controlling the flow of data, error correction and network service optimization.” Pg 79 Tittel: CISSP Study Guide.
Not C.
“The Application itself it is not located within this layer [Application]; rather the protocols and services required to transmit files, exchange messages, connect to remote terminals, and so on are here.” Pg. 80 Tittel: CISSP Study Guide
ICMP and IGMP belong to which layer of the OSI model? A. Datagram B. Network C. Transport D. Link
Answer: B
Explanation: The Network layer (layer 3) is responsible for adding routing information to the data. The Network layer accepts the segment from the Transport layer and adds information to it to create a packet. The packet includes the source and destination IP addresses. T
The routing protocols are located at this layer and include the following: Internet Control Message Protocol (ICMP) Routing Information Protocol (RIP) Open Shortest Path First (OSPF) Border Gateway Protocol (BGP) Internet Group Management Protocol (IGMP) Internet Protocol (IP) Internet Packet Exchange (IPX) Pg. 78 Tittel: CISSP Study Guide
The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers 6 is which of the following? A. Application Layer B. Presentation Layer C. Data Link Layer D. Network Layer
Answer: B
Explanation: “Presentation Layer (Layer 6).” Pg 81 Krutz The CISSP Prep Guide.
Which OSI/ISO layer is IP implemented at? A. Session layer B. Transport layer C. Network layer D. Data link layer
Answer: C
Explanation:
Which of the following security-focused protocols operates at a layer different from the others?
A. Secure HTTP
B. Secure shell (SSH-2)
C. Secure socket layer (SSL)
D. Simple Key Management for Internet Protocols (SKIP)
Answer: A
Explanation:
In the OSI/ISO model, at what layer are some of the SLIP, CSLIP, PPP control functions are provided? A. Data Link B. Transport C. Presentation D. Application
Answer: A
Explanation:
ICMP and IGMP belong to which layer of the OSI Model? (Fill in the blank)
Answer:
Network
The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers 6 is which of the following? (Fill in the blank)
Answer: Presentation
Which of the following OSI layers provides non-repudiation services? (Fill in the blank)
Answer: Application
The OSI model contains seven layers. TCP/IP is generally accepted as having how many layers? A. four B. five C. six D. eight
Answer: A
Explanation: The TCP/IP Protocol Model is similar to the OSI model, but it defines only the following four layers instead of seven: Application Layer, Host-to-Host Transport Layer, Internet Layer, Network Access or Link Layer. Pg. 84 Krutz: The CISSP Prep Guide.
Which of the following layers provides end-to-end service? A. Network Layer B. Link Layer C. Transport Layer D. Presentation Layer
Answer: C
Explanation: Session services located in the Transport Layer both segment and reassemble the data from upper-layer applications and unite it onto the same data stream, which provides end-toend data transport services and establishes a logical connection between the sending host and destination host on a network. Pg. 82 Krutz: The CISSP Prep Guide.
Both TCP and UDP use port numbers of what length? A. 32 bits B. 16 bits C. 8 bits D. 4 bits
Answer: B
Explanation:
Which one of the following is an effective communications error-control technique usually implemented in software? A. Redundancy check B. Packet filtering C. Packet checksum D. Bit stuffing
Answer: C
Explanation:
What is the proper term to refer to a single unit of IP data? (Fill in the blank)
Answer:
Datagram “When the Ethernet software receives a datagram from the Internet layer, it performs the following steps: 1.) Breaks IP layer data into smaller chunks if necessary which will be in the data field of ethernet frames.” Pg. 40 Sams Teach Yourself TCP/IP in 24 hrs.
What is the proper term to refer to a single unit of TCP data at the transport layer? A. TCP segment B. TCP datagram C. TCP frame D. TCP packet
Answer: A
Explanation: The data package created at the transport layer, which encapsulates the Application layer message is called a segment if it comes from TCP/IP.” Pg. 27 Pg. 55 Casad: Sams Teach Yourself TCP/IP in 24 hrs.
Each data packet is assigned the IP address of the sender and the IP address of the: A. recipient B. host C. node D. network
Answer: A
Explanation:
Both TCP and UDP use port numbers of what length? A. 32 bits B. 16 bits C. 8 bits D. 4 bits
Answer: B
Explanation: 2 to 16th power = 65,536
“TCP and UDP each have 65,536 ports”. Pg 75 Tittel: CISSP Study Guide
Which of the following type of packets can *easily* be denied with a stateful packet filter? A. ICMP B. TCP C. UDP D. IP
Answer: B
Explanation:
Which ports are the “Register ports”, registered by the IANA? A. Ports 128 to 255 B. Ports 1024 to 49151 C. Ports 1023 to 65535 D. Ports 1024 to 32767
Answer: B
Explanation: * the System Ports, also known as the Well Known Ports, from 0-1023 (assigned by IANA) * the User Ports, also known as the Registered Ports, from 1024- 49151 (assigned by IANA) * the Dynamic Ports, also known as the Private or Ephemeral Ports, from 49152-65535 (never assigned)
Reference: http://tools.ietf.org/html/draft-ietf-tsvwg-iana-ports-10
What protocol was UDP based and mainly intended to provide validation of dial up user login passwords? A. PPTP B. L2TP C. IPSec D. TACACS
Answer: D
Explanation: The original TACACS protocol was developed by BBN for MILNET. It was UDP based and mainly intended to provide validation of dial up user login passwords. The TACACS protocol was formally specified, but the spec is not generally available.
On which port is POP3 usually run? A. 110 B. 109 C. 139 D. 119
Answer: A
Explanation:
The primary function of this protocol is to send messages between network devices regarding the health of the network:
A. Internet Control Message Protocol (ICMP)
B. Reverse Address Resolution Protocol (RARP)
C. Address Resolution Protocol (AR)
D. Internet Protocol (IP)
Answer: A
Explanation:
Telnet and rlogin use which protocol? A. UDP B. SNMP C. TCP D. IGP
Answer: C
Explanation:
The IP header contains a protocol field. If this file contains the value of 2, what type of data is contained within the IP datagram? A. TCP B. ICMP C. UDP D. IGMP
Answer: D
Explanation: ICMP = 1 IGMP = 2 TCP = 6 UDP = 17
Pg. 55 Casad: Sams Teach Yourself TCP/IP in 24 hrs.
The IP header contains a protocol field. If this field contains the value of 17, what type of data is contained within the ip datagram? A. TCP B. ICMP C. UDP D. IGMP
Answer: C
Explanation: ICMP = 1 IGMP = 2 TCP = 6 UDP = 17
Pg. 55 Casad: Sams Teach Yourself TCP/IP in 24 hrs.
Why do some sites choose not to implement Trivial File Transfer Protocol (TFTP)? A. list restrictions B. inherent security risks C. user authentication requirement D. directory restriction
Answer: B
Explanation:
The IP header contains a protocol field. If this field contains the value of 6, what type of data is contained within the ip datagram? A. TCP B. ICMP C. UDP D. IGMP
Answer: A
Explanation: ICMP = 1 TCP = 6 UDP = 17
Pg. 55 Casad: Sams Teach Yourself TCP/IP in 24 hrs.
Which of the following is not a basic security service defined by the OSI? A. Routing control B. Authentication C. Data Confidentiality D. Logging and monitoring
Answer: D
Explanation: Routing control IS defined, but no mention of Logging & Monitoring.
Reference:
http://en.wikipedia.org/wiki/Security_service_(telecommunication)
And
http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.800-199103-I!!PDF-E&type=items
Which of the following is not an OSI architecture-defined broad category of security standards? A. Security techniques standards B. Layer security protocol standards C. Application-specific security D. Firewall security standards
Answer: D
Explanation:
Which one of the following is the Open Systems Interconnection (OSI) protocol for message handling? A. X.25 B. X.400 C. X.500 D. X.509
Answer: B
Explanation: An ISO and ITU standard for addressing and transporting e-mail messages. It conforms to layer 7 of the OSI model and supports several types of transport mechanisms, including Ethernet, X.25, TCP/IP, and dial-up lines. http://www.webopedia.com/TERM/X/X_400.html
The IP header contains a protocol field. If this field contains the value of 1, what type of data is contained within the IP datagram? A. TCP B. ICMP C. UDP D. IGMP
Answer: B
Explanation: ICMP = 1 IGMP = 2 TCP = 6 UDP = 17
Pg. 55 Casad: Sams Teach Yourself TCP/IP in 24 hrs.
Which of the following is true?
A. TCP is connection-oriented. UDP is not
B. UDP provides for Error Correction. TCP does not.
C. UDP is useful for longer messages
D. UDP guarantees delivers of data. TCP does not guarantee delivery of data.
Answer: A
Explanation:
What works as an E-mail message transfer agent? A. SMTP B. SNMP C. S-RPC D. S/MIME
Answer: A
Explanation: