Ch 11 Flashcards Preview

SP7 - R/Q > Ch 11 > Flashcards

Flashcards in Ch 11 Deck (20)
1

1. What is layer 4 of the OSI model?

A. Presentation
B. Network
C. Data Link
D. Transport

Answer: D

The Transport layer is layer 4. The Presentation layer is layer 6, the Data Link layer is layer 2, and the Network layer is layer 3.

2

2. What is encapsulation?

A. Changing the source and destination addresses of a packet
B. Adding a header and footer to data as it moves down the OSI stack
C. Verifying a person's identity
D. Protecting evidence until it has been properly collected

Answer: B

Encapsulation is adding a header and footer to data as it moves down the OSI stack.

3

3. Which OSI model layer manages communications in simplex, half-duplex, and full-duplex modes?

A. Application
B. Session
C. Transport
D. Physical

Answer: B

Layer 5, Session, manages simplex (one-direction), half-duplex (two-way, but only one direction can send data at a time), and full-duplex (two-way, in which data can be sent in both directions simultaneously) communications.

4

4. Which of the following is the least resistant to EMI?

A. Thinnet
B. 10Base-T UTP
C. 10Base5
D. Coaxial cable

Answer: B

10Base-T UTP is the least resistant to EMI because it is unshielded. Thinnet (10Base2) and thicknet (10Base5) are each a type of coaxial cable, which is shielded against EMI.

5

5. Which of the following is not an example of network segmentation?

A. Intranet
B. DMZ
C. Extranet
D. VPN

Answer: D

A VPN is a secure tunnel used to establish connections across a potentially insecure intermediary network. Intranet, extranet, and DMZ are examples of network segmentation.

6

6. Which of the following is not considered a non-IP protocol?

A. IPX
B. UDP
C. AppleTalk
D. NetBEUI

Answer: B

UDP is a transport layer protocol that operates as the payload of an IP packet. While it is not IP itself, it depends on IP. IPX, AppleTalk, and NetBEUI are all alternatives to IP and thus are labeled as non-IP protocols.

7

7. If you are the victim of a bluejacking attack, what was compromised?

A. Your firewall
B. Your switch
C. Your cell phone
D. Your web cookies

Answer: C

A bluejacking attack is a wireless attack on Bluetooth, and the most common device compromised in a bluejacking attack is a cell phone.

8

8. Which networking technology is based on the IEEE 802.3 standard?

A. Ethernet
B. Token Ring
C. FDDI
D. HDLC

Answer: A

Ethernet is based on the IEEE 802.3 standard.

9

9. What is a TCP wrapper?

A. An encapsulation protocol used by switches
B. An application that can serve as a basic firewall by restricting access based on user IDs or system IDs
C. A security protocol used to protect TCP/IP traffic over WAN links
D. A mechanism to tunnel TCP/IP through non-IP networks

Answer: B

A TCP wrapper is an application that can serve as a basic firewall by restricting access based on user IDs or system IDs.

10

10. What is both a benefit and a potentially harmful implication of multilayer protocols?

A. Throughput
B. Encapsulation
C. Hash integrity checking
D. Logical addressing

Answer: B

Encapsulation is both a benefit and a potentially harmful implication of multilayer protocols.

11

11. By examining the source and destination addresses, the application usage, the source of origin, and the relationship between current packets with the previous packets of the same session, __________ firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.

A. Static packet-filtering
B. Application-level gateway
C. Stateful inspection
D. Circuit-level gateway

Answer: C

Stateful inspection firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.

12

12. __________ firewalls are known as third-generation firewalls.

A. Application-level gateway
B. Stateful inspection
C. Circuit-level gateway
D. Static packet-filtering

Answer: B

Stateful inspection firewalls are known as third-generation firewalls.

13

13. Which of the following is not true regarding firewalls?

A. They are able to log traffic information.
B. They are able to block viruses.
C. They are able to issue alarms based on suspected attacks.
D. They are unable to prevent internal attacks.

Answer: B

Most firewalls offer extensive logging, auditing, and monitoring capabilities as well as alarms and even basic IDS functions. Firewalls are unable to block viruses or malicious code transmitted through otherwise authorized communication channels, prevent unauthorized but accidental or intended disclosure of information by users, prevent attacks by malicious users already behind the firewall, or protect data after it passed out of or into the private network.

14

14. Which of the following is not a routing protocol?

A. OSPF
B. BGP
C. RPC
D. RIP

Answer: C

There are numerous dynamic routing protocols, including RIP, OSPF, and BGP, but RPC is not a routing protocol.

15

15. A __________ is an intelligent hub because it knows the addresses of the systems connected on each outbound port. Instead of repeating traffic on every outbound port, it repeats traffic only out of the port on which the destination is known to exist.

A. Repeater
B. Switch
C. Bridge
D. Router

Answer: B

A switch is an intelligent hub. It is considered to be intelligent because it knows the addresses of the systems connected on each outbound port.

16

16. Which of the following is not a technology specifically associated with 802.11 wireless networking?

A. WAP
B. WPA
C. WEP
D. 802.11i

Answer: A

Wireless Application Protocol (WAP) is a technology associated with cell phones accessing the Internet rather than 802.11 wireless networking.

17

17. Which wireless frequency access method offers the greatest throughput with the least interference?

A. FHSS
B. DSSS
C. OFDM
D. OSPF

Answer: C

Orthogonal Frequency-Division Multiplexing (OFDM) offers high throughput with the least interference. OSPF is a routing protocol, not a wireless frequency access method.

18

18. What security concept encourages administrators to install firewalls, malware scanners, and an IDS on every host?

A. Endpoint security
B. Network access control (NAC)
C. VLAN
D. RADIUS

Answer: A

Endpoint security is the security concept that encourages administrators to install firewalls, malware scanners, and an IDS on every host.

19

19. What function does RARP perform?

A. It is a routing protocol.
B. It converts IP addresses into MAC addresses.
C. It resolves physical addresses into logical addresses.
D. It manages multiplex streaming.

Answer: C

Reverse Address Resolution Protocol (RARP) resolves physical addresses (MAC addresses) into logical addresses (IP addresses).

20

20. What form of infrastructure mode wireless networking deployment supports large physical environments through the use of a single SSID but numerous access points?

A. Stand-alone
B. Wired extension
C. Enterprise extension
D. Bridge

Answer: C

Enterprise extended infrastructure mode exists when a wireless network is designed to support a large physical environment through the use of a single SSID but numerous access points.