• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/33

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

33 Cards in this Set

  • Front
  • Back
What type of cable is used with 100Base-TX Fast Ethernet?
A.) Fiber-optic cable
B.) Four pairs of Category 3, 4, or 5 unshielded twisted-pair (UTP) wires.
C.) Two pairs of Category 5 unshielded twisted-pair (UTP) or Category 1 shielded twisted-pair
(STP) wires
D.) RG-58 Cable
c
Which cable technology refers to the CAT 3 and Cat5 Categories?
A.) Coaxial cables
B.) Fiber Optic cables
C.) Axial cables
D.) Twisted Pair cables
d
In the OSI/ISO model, at what layer are some of the SLIP, CSLIP, PPP, control functions
are provided?
A.) Link
B.) Transport
C.) Presentation
D.) Application
a
In the OSI/ISO model, at what level are TCP and UDP provided?
A.) Transport
B.) Network
C.) Presentation
D.) Application
a
Which of the following OSI layers does not provide confidentiality?
A.) Presentation
B.) Network
C.) Transport
D.) Session
c
The International Standards Organization/Open Systems Interconnection (ISO/OSI)
Layers does NOT have which of the following characteristics?
A.) Standard model for network communications
B.) Used to gain information from network devices such as count of packets received and routing
tables
C.) Allows dissimilar networks to communicate
D.) Defines 7 protocol layers (a.k.a. protocol stacks)
b
Which Open Systems Interconnect (OSI) layers provide Transport Control Protocol/Internet Protocol (TCP/IP)
end-to-end security?
A. Application and presentation
B. Presentation and session
C. Network and application
D. Application and transport
Answer: B
"The Session layer (layer 5) is responsible for establishing, maintaining, and terminating
communication sessions between two computers. The primary technology within layer 5 is a
gateway. The following protocols operate within the Session layer:
Secure Sockets Layer (SSL)
Network File System (NFS)
Structured Query Language (SQL)
Remote Procedure Call (RPC)
ICMP and IGMP belong to which layer of the OSI model?
A.) Datagram
B.) Network
C.) Transport
D.) Link
b
Which of the following security-focused protocols operates at a layer different from the
others?
A.) Secure HTTP
B.) Secure shell (SSH-2)
C.) Secure socket layer (SSL)
D.) Simple Key Management for Internet Protocols (SKIP)
a
Which of the following OSI layers provides non-repudiation services? (Fill in the blank)
Answer: Application
Which of the following layers provides end-to-end service?
A.) Network Layer
B.) Link Layer
C.) Transport Layer
D.) Presentation Layer
c
Both TCP and UDP use port numbers of what length?
A.) 32 bits
B.) 16 bits
C.) 8 bits
D.) 4 bits
Answer: B
Which one of the following is an effective communications error-control technique usually implemented in
software?
A. Redundancy check
B. Packet filtering
C. Packet checksum
D. Bit stuffing
Answer: C
What is the proper term to refer to a single unit of TCP data at the transport layer?
A.) TCP segment
B.) TCP datagram
C.) TCP frame
D.) TCP packet
Answer: A
Both TCP and UDP use port numbers of what length?
A.) 32 bits
B.) 16 bits
C.) 8 bits
D.) 4 bits
Answer: B
2 to 16th power = 65,536
"TCP and UDP each have 65,536
Which ports are the "Register ports", registered by the IANA?
A.) Ports 128 to 255
B.) Ports 1024 to 49151
C.) Ports 1023 to 65535
D.) Ports 1024 to 32767
Answer: B
What protocol was UDP based and mainly intended to provide validation of dial up user login
passwords?
A. PPTP
B. L2TP
C. IPSec
D. TACACS
d
The IP header contains a protocol field. If this file contains the value of 2, what type of data
is contained within the IP datagram?
A.) TCP
B.) ICMP
C.) UDP
D.) IGMP
Answer: D
The IP header contains a protocol field. If this field contains the value of 17, what type of
data is contained within the ip datagram?
A.) TCP
B.) ICMP
C.) UDP
D.) IGMP
Answer: C
ICMP = 1
TCP = 6
UDP = 17
Which of the following is not a basic security service defined by the OSI?
A.) Routing control
B.) Authentication
C.) Data Confidentiality
D.) Logging and monitoring
Answer: A
Which one of the following is the Open Systems Interconnection (OSI) protocol for
message handling?
A. X.25
B. X.400
C. X.500
D. X.509
Answer: B
Which of the following is an ip address that is private (i.e. reserved for internal networks,
and not a valid address to use on the internet)?
A.) 172.5.42.5
B.) 172.76.42.5
C.) 172.90.42.5
D.) 172.16.42.5
Answer: D
The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the
IP address space for private Internets -
10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255,
and 192.168.0.0 to 192.168.255.255-
ARP and RARP map between which of the following?
A.) DNS addresses and IP addresses
B.) 32-bit hardware addresses and 48-bit IPv6 addresses
C.) 32-bit hardware addresses and 48-bit IPv4 addresses
D.) 32-bit addresses in IPv4 and 48-bit hardware addresses
Answer: D
An Ethernet address is a 48-bit address that is hard-wired into the NIC of the network node. ARP
matches up the 32-bit IP address with this hardware address, which is technically referred to as
the Media Access Control (MAC) address or the physical address
Which protocol matches an Ethernet address to an Internet Protocol (IP) address?
A.) Address Resolution Protocol (ARP)
B.) Reverse Address Resolution Protocol (RARP)
C.) Internet Control Message Protocol (ICMP)
D.) User Datagram Protocol (UDP)
b
In a typical firewall configuration, what is the central host in organization's network
security?
A. Stateful
B. Screen
C. Gateway
D. Bastion
Answer: D
Bastion Host: A system that has been hardened to resist attack at some critical point of entry, and
which is installed on a network in such a way that it is expected to come under attack. Bastion
hosts are often components of firewalls, or may be 'outside" Web servers or public access
systems. Generally,
Which process on a firewall makes permit/deny forwarding decisions based solely on
address and service port information?
A. Circuit Proxy
B. Stateful Packet Inspection Proxy
C. Application Proxy
D. Transparency Proxy
Answer: A
Circuit-level proxy creates a circuit between the client computer and the server
Firewalls filter incoming traffic according to
A. The packet composition.
B. A security policy.
C. Stateful packet rules.
D. A security process.
Answer: B
By examining the "state" and "context" of the incoming data packets, it helps to track the
protocols that are considered "connectionless", such as UDP-based applications and
Remote Procedure Calls (RPC). This type of firewall system is used in:
A.) first generation firewall systems
B.) second generation firewall systems
C.) third generation firewall systems
D.) fourth generation firewall systems
Answer: C
-Packet filtering is the first generation firewall
Which of the following statements pertaining to packet filtering is incorrect?
A.) It is based on ACLs
B.) It is not application dependant
C.) It operates at the network layer
D.) It keeps track of the state of a connection
Answer: D
A screening router can perform packet filtering based upon what data?
A. Translated source destination addresses.
B. Inverse address resolution.
C. Source and destination port number.
D. Source and destination addresses and application data.
Answer: C

It's just a
router that has filters associated with it to screen outbound and inbound traffic based on IP
address and UDP and TCP ports.
Which of the following statements is not true of IPSec Transport mode?
A.) It is required for gateways providing access to internal systems
B.) Set-up when end-point is host or communications terminates at end-points
C.) If used in gateway-to-host communication, gateway must act as host
D.)Detective/Administrative Pairing
Answer: A
What is called the standard format that was established to set up and manage Security
Associations (SA) on the Internet in IPSec?
A.) Internet Key Exchange
B.) Secure Key Exchange Mechanism
C.) Oakley
D.) Internet Security Association and Key Management Protocol
Answer: D
What technique is used to prevent eavesdropping of digital cellular telephone
conversations?
A. Encryption
B. Authentication
C. Call detail suppression
D. Time-division multiplexing
Answer: D
The name "TDMA" is also used to refer to a specific second generation mobile phone standard -
more properly referred to as IS-136, which uses the TDMA technique to timeshare the
bandwidth of the carrier wave. It provides between 3 to 6 times the capacity of its predecessor
AMPS, and also improved security and privacy.