Communication and Network Security Flashcards
This domain represents 14 percent of the CISSP exam. The Communication and Network Security domain requires a thorough understanding of network fundamentals, secure network design, concepts of network operation, networking technologies and network management techniques. (43 cards)
Q. 1 The purpose of intrusion detection is
To detect attacks and other anomalies Your selection is incorrect To make sure that people aren’t trying to tailgate through security entrances To verify that the honeypot or honeynet is working correctly To detect hacking attempts that the firewall misses
A.
[Communication and Network Security] Intrusion detection identifies intrusion attempts, attacks, and other anomalies on the host or network.
Q. 2 Which of the following are examples of encapsulation protocols? Drag and drop the correct answer(s) from top to bottom. PGP IPSec L2TP SMTP PPP SLIP
IPSec
SLIP
PPP
L2TP
[Communication and Network Security] The Simple Mail Transfer Protocol (SMTP) is used to send email; it is not an encapsulation protocol. Pretty Good Privacy (PGP) is a data encryption program; it is not an encapsulation protocol.
Q. 3 Which of the following cable types is most difficult to tap by eavesdroppers?
Fiber optic UTP Coax STP
Fiber optic
A. [Communication and Network Security] Unshielded twisted pair (UTP), shielded twisted pair (STP), and coax cables all are relatively easy for an eavesdropper to tap. Fiber optic cable is more difficult to tap because it requires specialized equipment to tap light media and the fiber optic cable can be easily damaged, which would make eavesdropping activity easily detectable.
Q. 4 Which of the following are link-state routing protocols? Drag and drop the correct answer(s) from top to bottom.
RIP
BGP
IS-IS
OSPF
IS-IS
OSPF
[Communication and Network Security] Routing Information Protocol (RIP) is a distance vector routing protocol. Border Gateway Protocol (BGP) is distance vector (or path vector) routing protocol.
Q. 5 An access control list is NOT used by
A firewall or screening router to determine which packets should pass through A router to determine which administrative nodes may access it A bastion host to determine which network services should be permitted A client system to record and save passwords
A client system to record and save passwords
D.
[Communication and Network Security] Access control lists (ACLs) commonly are used on firewalls, routers, and bastion hosts. ACLs are not used to save passwords on a computer.
Q. 6 The purpose of a bastion host is to
Be a backup firewall in case the main firewall fails or becomes overloaded Host Internet-facing services Serve as the security management server Serve as the firewall management server
Host Internet-facing services
[Communication and Network Security] A bastion host is used to host Internet-facing services, such as a website or domain name service (DNS) server.
Q. 7 PAP is considered a weak authentication protocol because
It uses a static password that’s not encrypted It uses a changing, but predictable, password that’s not encrypted Its session keys are easily guessed Only the first four characters of the password are significant
It uses a static password that’s not encrypted
[Communication and Network Security] Password Authentication Protocol (PAP) uses a static password that is not encrypted.
Q. 8 Wardriving is the term used to describe
Aggressive driving Sniffing wireless networks to look for vulnerabilities Running multiple concurrent port scanning tools on a system Running Call of Duty™ on a gigabit Ethernet
Sniffing wireless networks to look for vulnerabilities
[Communication and Network Security] War driving is similar to war dialing; an individual uses a wireless mobile device and special software while driving or roaming around looking for vulnerable WiFi networks.
Q. 9 A disadvantage of signature-based intrusion detection is that
It can’t recognize unknown attacks It detects intrusions only on hosts, not on networks It detects intrusions only on networks, not on hosts It can detect only mechanized attacks, not hacker attack
It can’t recognize unknown attacks
[Communication and Network Security] Signature-based IDS only can detect attacks that are defined in its signature file. Therefore, it is of limited effectiveness for zero-day threats.
Q. 10 Operational security issues associated with virtualized environments include which of the following? Drag and drop the correct answer(s) from top to bottom. Keep the correct answers in alphabetical order.
Dynamic DNS Dormant VMs Hypervisor Incompatibility Network Visibilty VM sprawl
Dormant VMs
VM sprawl
Network Visibilty
[Communication and Network Security] The rapid and often unmanaged (uncontrolled) growth of VMs in the data center (VM sprawl), VMs that aren’t actively running and therefore not regularly patched (dormant VMs), and a lack of network visibility to multiple VMs running on a physical host are all operational security issues associated with virtualized environments.
Q. 11 The ping command sends
IGRP Echo Reply packets IGRP Echo Request packets ICMP Echo Request packets UDP Echo Request packets
ICMP Echo Request packets
[Communication and Network Security] Packet Internet Groper (ping) is an Internet Control Message Protocol (ICMP) command that sends Echo Reply packets.
Q. 12 Which of the following are private circuit technologies? Drag and drop the correct answer(s) from top to bottom.
MPLS
E1
T3
xDSL
E1
T3
xDSL
[Communication and Network Security] Multiprotocol label switching (MPLS) is a type of data-carrying technique commonly used on carrier networks. It is not a private circuit technology.
Q. 13 The biggest disadvantage of callback security is
The caller can call only from a predetermined location It only works in networks that support caller ID It’s vulnerable to replay attack It works only in networks that support *69 functionality
The caller can call only from a predetermined location
[Communication and Network Security] Callback security associates a dial-in user with a callback phone number, which requires the caller to call from a predetermined phone number (location).
Q. 14 A security engineer has determined that a Wi-Fi access point uses the WEP protocol and broadcasts its SSID. The best course of action is
Change to WPA2 Turn off broadcast Change to WPA2 and turn off broadcast Add MAC address access control
Change to WPA2 and turn off broadcast
[Communication and Network Security] Implementing the WiFi Protected Access 2 (WPA2) security protocol and turning off SSID broadcasting is the most secure solution.
Q. 15 What’s the purpose of NAT?
To convert a session’s private IP address to a public address To detect spoofed IP packets To counterattack hacking attempts To facilitate court-ordered wiretaps
To convert a session’s private IP address to a public address
[Communication and Network Security] Network Address Translation (NAT) is used to convert private, non-routable IP addresses into routable public IP addresses.
Q. 16 The primary security benefit of a switched LAN versus a shared-media LAN is
Switches don’t transmit spoofed IP packets Broadcast packets are sent only to nodes on the local switch Unlike a shared-media LAN, a network sniffer can’t capture all switched LAN traffic Switches aren’t vulnerable to broadcast storms
Unlike a shared-media LAN, a network sniffer can’t capture all switched LAN traffic
[Communication and Network Security] Traffic on a switched LAN is sent only to the physical switch port associated with the destination node. A shared-media LAN broadcasts traffic across ports.
Q. 17 Which of the following are examples of protocols used to create a VPN? Drag and drop the correct answer(s) from top to bottom.
IPSec L2TP P2P PPTP MAC SSL
IPSec
SSL
PPTP
L2TP
Communication and Network Security] P2P is not a VPN protocol standard; it refers to a point-to-point network connection or a peer-to-peer distributed application architecture. Media access control (MAC) is a physical hardware address, not a VPN protocol standard.
Q. 18 A disadvantage of host-based intrusion detection is that
Event correlation isn’t possible It can’t detect broadcast packets It consumes resources on the host It can perform only signature-based detection
It consumes resources on the host
[Communication and Network Security] Host-based IDS consumes resources on the host because the IDS must analyze potentially high volumes of network traffic.
Q. 19 The main disadvantage of signature-based intrusion detection is
It’s considerably more expensive than linguistic intrusion detection Some hackers are good at forging other people’s signatures Signatures must be kept up-to-date Handwriting samples are inconsistent and not always legible
Signatures must be kept up-to-date
[Communication and Network Security] Like antivirus (anti-malware) software, signature-based intrusion detection systems must be frequently updated to be effective against new and evolving (zero-day) threats.
Q. 20 Which of the following is NOT true of an Ethernet network?
Ethernet is a broadcast medium Ethernet is a switched medium IP addresses can be forged on an Ethernet network MAC addresses can be forged on an Ethernet network
Ethernet is a broadcast medium
[Communication and Network Security] Ethernet is a switched medium; it is not a broadcast medium.
Q. 21 The purpose of Layer 1 in the OSI model is to
Transmit and receive bits Sequence packets and calculate checksums Perform application-to-application communications Transmit and receive frames
Transmit and receive bits
[Communication and Network Security] The Physical layer (Layer 1) in the OSI model is concerned with sending and receiving bits.
Q. 22 Which of the following are basic types of wireless antennas? Drag and drop the correct answer(s) from top to bottom.
omnidirectional Parabolic Sectorized Compartmentalized Anabolic Yagi
omnidirectional
Parabolic
Sectorized
Yagi
[Communication and Network Security] Compartmentalized and anabolic are not antenna types.
Q. 23 Which of the following are examples of routed protocols? Drag and drop the correct answer(s) from top to bottom.
OSPF
EIGRP
BGP
IPX
IPX
[Communication and Network Security] Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), and Border Gateway Protocol (BGP) are all routing protocols, not routed protocols.
Q. 24 Which of the following authentication technologies are commonly used in federated environments? Drag and drop the correct answer(s) from top to bottom.
OAuth OTP OpenID SAML API SSO
OAuth OTP OpenID SAML SSO
[Identity and Access Management] Neither one-time passwords (OTPs) nor application programming interfaces (APIs) are authentication technologies.