• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/127

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

127 Cards in this Set

  • Front
  • Back
In the OSI reference model , on which later can a telphone number be described?
This depends on the nature of the telephony system (for instance, Voice-over-IP versus
public switched telephony network (PSTN))
Which transmission modes exist on OSI layer 5?
Simplex, half duplex, duplex
3. In which of the following situations is the network itself not a target of attack?
MiTM
Which of the following are effective protective or countermeasures against a distributed denialof-
service attack? a = Redundant network layout; b = Secret fully qualified domain names
(FQDNs); c = Reserved bandwidth; d = Traffic filtering; e = Network Address Translation (NAT).
c. a and c
5. What is the optimal placement for network-based intrusion detection systems (NIDSs)?
On network segments with business-critical systems (e.g., demilitarized zones (DMZs)
and on certain intranet segments)
Which of the following are meaningful uses for network-based scans? a = Discovery of devices
and services on a network; b = Test of compliance with the security policy; c = Detection of
attackers in a network, for instance, sniffers; d = Test for vulnerabilities and backdoors, for
instance, as part of a penetration test or to detect PCs infected by Trojans;
b. a, b, and d
7. Which of the following is an advantage of fiber-optic over copper cables from a security
perspective?
b. Fiber optics are more difficult to wiretap.
8. Which of the following devices should not be part of a network's perimeter defense?
boundary router, firewall, proxy server
non of the above
9. Which of the following is a principal security risk of wireless LANs?
a. Lack of physical access control
10. Which of the following configurations of a WLAN's SSID offers adequate security protection?
d. None of the above
11. Which of the following is the principal security risk of broadband Internet access proliferation for
home users?
Home computers that are not securely configured or maintained and are permanently
connected to the Internet become easy prey for attackers.
12. Who should be allowed to change rules on a firewall and for which reason?
The firewall administrator in compliance with a change process that will, in particular,
validate the request against the organization's security policy and provide proper
authorization for the request
13. Which of the following is the principal benefit of a personal firewall?
They provide a PC on a public network with a reasonable degree of protection; if the PC
connects to a trusted network later on (for instance, an Intranet), it will prevent the PC
from becoming an agent of attack (e.g., by spreading viruses).
14. Which of the following are true statements about IPSec?
provides mechanisms for auth an encryption and authenticates hosts against each other
15. Which of the following statements about well-known ports (0 through 1023) on layer 4 is true?
On most operating systems, use of well-known ports requires system-level
(administrative, superuser) access.
Which of the following is the enabler for TCP sequence number attacks, and which mitigation
exists?
The fact that sequence numbers can be predicted, enabling insertion of illegitimate
packets into the data stream. Mitigation is offered by better randomization, as described
in RFC 1948.
17. Which of the following is the principal weakness of DNS (Domain Name System)?
Lack of authentication of servers, and thereby authenticity a. of records
18. Which of the following statements about open e-mail relays is incorrect?
Using a blacklist of open e-mail relays provides a secure way for an e-mail administrator
to identify open mail relays and filter spam.
19. A cookie is a way to:
b. Add statefulness to the (originally stateless) HTTP
20. From a disaster recovery perspective, which of the following is the principal concern associated
with Voice-over-IP services?
They can make the IP network of an organization a single point of failure for
communication.
21. Why is public key encryption unsuitable for multicast applications?
c. All data is going to all members of the multicast group.
IEEE 802.3 defines
Ethernet
IEEE 802.5 defines
Token ring
Which WLAN spec uses OFDM
802.11a, 802.11g
2.4GHz WLAN specs
802.11b,g
protocol which uses PVCs and SVC. Overhead requirement limit it to lower speeds
X.25
high performance packet switching technology designed to replace X.25
Frame Relay
Very high speed, similar to Frame relay.uses PVCs and SVC. carry all traffic types
ATM
standard protocol for enabling wireless data access via small portable terminals to secure transaction service
Wireless Application Protocol (WAP)
What document defines the OSI model
ISO 7498
Layer 2 consists of what
1) Logical Link Control
2) Media Access Control
In the OSI reference model, which layer can Ethernet be described
Layer 2
Which of the following are effective protective countermeasures against DDOS
Redundant network layout, Reserve bandwidth and traffic filtering
OPtimal placement for NIDS?
network perimeter
A Security Event Manager (SEM)...
aggregates logs from secuirity devices and application server looking for suspicious activity
Methodology of an Attack step
1. Target Acquisition
2. Target Analysis
3. Target Access
4. Target appropriation
802.11i defines
RSNs, WPA-AES, security
802.1x defines
port security
T/F PAP transmits password in the clear
true
how does CHAP transmit the password
one-way hash
T/F CHAP features periodic authentication
true
Radius and EAP fall under
802.1x
protocol provides bandwidth mgmt and a scalable solutions for network usage without the performance penalties of encryption
MPLS
what type of proxy does not inspect any traffic
circuit proxy
another name for a screened subnet is a
DMZ
a popular circuit proxy server that can act as a VPN
SOCKS
IKE consists of
OAKLEY and ISAKMP
IPSEC offers
encryption & auth
SOCKS offers
only Auth
SSH offers
encryption and auth
L2F offers
tunnine
L2TP offers
only auth (but encryption w/ IPSec)
PPTP offers
encryption, auth (MSCHAPv2)
MPLS offers
only tunneling
SSL/TLS offers
Encryption and auth
Two modes of IPSec
Transport (payload only)
Tunnel (paylod + header)
a Security Assocation, used by network device to identify connections, consist of:
1) SPI
2) IP Dst address
3) AH or ESP identifier
an Autonomous system is controlled by
one organization
Java RMI and Microsoft's .NEt function at what layer
Layer 5 (session)
Aside from TCP & UDP what is another Layer 4 protocol
SPX
what layer ensure a common format for data (ASCII/Unicode, codecs)
Layer 6-Presentation
GPRS, 1xRTT (144kbps) represent which generation
2.5 generation
Analog cellular is what generation
1st generation
TDMA, GSM, CDMA represent which generation
2nd generation
DNSSEC uses what to secure dtat
digital signatures
IPSec provies whcih security features
Connectionless Integrity
In a very large organization, where th user pop ulation is dynamic and static apassword are undesirable, which method of authentication would be desireable?
CHAP, b/c MSCHAP is non standard
One of the main risks associated with VOIP may be:
DoS
Which layer is least suitable when end-to-end encryption is needed
data-link
Which of the following network technologies would be best suited to operate in an Error-prone environment
X.25
what protocol has the overhead of ACKs for each hop, and has a strong focus on error correction
X.25
unless what it's built on, assumes the cloud is reliable
Frame Relay
which of these routing protocols support optional authentication?
I) RIP v1
II) RIP v2
III) OSPF v3
IV) BGP v4
D) II,III,IV
L2TP provides confidentiality (T/F)
False, no encryption!!!
L2TP is a comnination of Cisco and MS's
L2F and PPTP
Convergine voice, video and data onto the same network infrastructure poses many challenges. Which of the following technologies would offer the greatest advantage when dealing with the different needs of Voice, video and data?
ATM
What is the most important consideration when designing a firewall architecture?
Understand the specific security needs of the business
Which of the following criteria should be met by off-site storage protetion for media backup?
The storage site should guard against unauthorized access
Which of the following can assist in preventing denial of service attacks?
Configure the router to check all outgoing traffic
The main difference between penetration testers and hackers is
pen tester have permission from the company
which of the following is a list of actice attacks against WLAN?
Masquerade, Replay, Message modification, and DoS
which wirless technology operaing in 5GHz
802.11a
what security pratices should be implemented to suppor wireless security
Policy, Change Control and Configuration mgmt
which of these types of scan is more often doen by white hat penetration testers rather than attackers
Compliance scanning
HDLC and SDLC operate at what layer`
2: data link
ISDN consists of what two channels
B (data)
D (signaling)
What is a beaconing functionality in a token passing technology?
Excludes a misbehaving computer from the ring
Another name for ThinNet
10Base2
Which of the following is a disadvantage of PPTP?
Works only over IP
a SONET architecture at a large university connecting internal network in each building is an example of
MAN
Not every data transmission incorporates the session layer. Which of the following best describes the functionality of the session layer?
a) end-to-end transmission
b) application client/server communication mechanism in a distributed environment
c) Application to computer physical communication
d) Provides application with the proper syntax for transsmission
Application client/server communication mechanism in a distributed environmen
Which polling protocol is used mainly to communicate with IBM mainframe systems?
Synchronous Data Link Control
What is the purpose of the LLC layer in the OSI model
provides a standard interface for the network layer protocol
Ethernet uses what type of access method?
CSMA/CD
Which of the following tunneling protocol would be used if tunneled communications needed to take plae over X.25, ATM or Frame Relay
L2TP
A corporate vice president routinely using his office phon for personal international phon calls in as example of what secuirty issue?
Telephone fraud
which of the following is required for LAN and WAN-centralized access control technologies?
system with database of authentication information
All of the following are true about bastion hosts except:
protected by the DMZ and has internal user accounts
what is the port range for well-known ports
0-1023
bandwidth of T3
45Mbps
SONET works at which layer
Layer 1: physical
What are two ways HDLC improves upon SDLC
1) provides higher throughput
2) supports full-duplex transmission
Which of the following is not true about ISDN?
a) required both B & D channels
b) supports voice, data, video transmission
c) sends control information over the B channel
d) uses the same wires as analog transmission
c) sends controll information over the B-channel
What is the electronic phenomenon that allows data to escape in a bundle of network cables?
Cross-talk
What is the importance of using plenum-rated cabling in buildings
Human safety
How are FDDI and FDDI-2 different
FDDI-2 allows for fixed bandwidth to be assigned.
In the TCP/IP model, where does PPP protocol reside
Network Access
how many bearer (B) channels does BRI ISDN have
2
how many bearer (B) channels does PRI ISDN have
23
UMTS, EVDO are what generation
3d Generation
nonces prevent
replay
difference between PEAP and EAL-TLS
EAP-TLS sends User Identity in the clear
PEAP sends a Domain Identifier instead

BUT EAP-TTLS protect user ID as well
what is the difference between open system authentication and shared key authentication
SKA requires a WEP encryption key
Paying for a guaranteed amount of frame relay bandwidth is called what
CIR (Committed Information rate)
In which technology do different user share the same network medium?
cable modem
which of the following is true about a SSID value
It is a value that the wireless device uses to authenticate the AP
Backbones that connect businesses to WANs , the Internet and other business usually via SONET networks are called what
MANs
which of the following is a reason companies implement routers and packet filters?
to provide protection that is transparent to users
How does PPTP provide protection
Through encryption and encapsulation
a WAN technology that uses 53-byte cells and has low delay levels is called what?
ATM
all data is is fragmented into fixed-length 53-byte cless..connection oriented suite of protocols. does not guarantee delivery of cells
ATM
Is DSL always on
yes
what replaced SLIP
PPP
what is a good definition of asynchronous communication
sequential data transfer, using bits framed with start and stop bits
What would be the best tool to deal with a distribute port scan?
Firewall
Principal benefit of personal firewalls
provide a PC on a public netowrk with a reasonable degree of protection; if the PC connects to a trusted netowrk later on , it will prevent the PC from becoming an agent of attack
factors when configuring audit logs
value of asset, threats against asset, sensitivity of asset