|
| 1. | Traditional voice networks typically include which of the following devices or protocols? (Choose all that apply.)
| |
| 2. | Subscriber signaling is used between which voice network devices?
| |
| 3. | Centrex lines offer which additional services beyond those of a PBX switch? (Choose all that apply.)
| |
| 4. | Which of the following methods best handles delay in VoIP networks?
| |
| 5. | What is the responsibility of the codec in voice networks? (Choose all that apply.)
| |
| 6. | Which of the following best describes variable delay?
| |
| 7. | Which solution can help smooth voice traffic that has been affected by jitter?
| |
| 8. | Cisco’s SAFE architecture blueprint design model addresses what network requirements?
| |
| 9. | Which devices would you expect to find in the Corporate Internet module of a SAFE-designed network? (Choose all that apply.)
| |
| 10. | Which devices would you expect to find in the Campus functional area of a SAFE-designed network? (Choose all that apply.)
| |
| 11. | Where would you typically find a firewall in a SAFE-designed network?
| |
| 12. | Which devices of a network are targets for security exploitation? (Choose all that apply.)
| |
| 13. | What can be placed on a host or network to act like an alarm system if security issues should arise?
| |
| 14. | When designing security for the E-Commerce module, which of the following are common countermeasures to typical security issues in this module? (Choose all that apply.)
| |
| 15. | Which type of server can be used to log security-related information from network devices?
| |
| 16. | When capturing security-related information to a Syslog server, which protocol provides accurate time reporting?
| |
| 17. | Which of the following is an outsourced service?
| |
| 18. | Which SAFE technology is most effective at preserving data confidentiality?
| |
| 19. | What is the first step in any secure network security design?
| |
| 20. | This type of network attack can render a host unreachable by valid requests.
| |
Answers
| 1. | B, C Traditional voice networks typically include PBX and Centrex switches. They also include tie-lines and trunks. |
| 2. | D Subscriber signaling is used between the PBX and the telephone. |
| 3. | A, B, C Centrex lines offer additional services such as call transfer, three-way calling, and closed-user plans. |
| 4. | B Delay in VoIP networks is handled by QoS. |
| 5. | C, D The codec is responsible for compressing and decompressing voice traffic. Codec choice determines the transfer rate. |
| 6. | B Jitter is defined as variable delay. |
| 7. | C Dejitter buffers can receive packets at an irregular rate and send them out at a more consistent rate. |
| 8. | C The purpose of Cisco’s SAFE architecture blueprint design model is to address the network’s security requirements. |
| 9. | C, D Cisco’s SAFE architecture design blueprint recommends that VPN access and Internet services be placed in the Corporate Internet module. |
| 10. | B, D Cisco’s SAFE architecture design blueprint recommends that management and intranet servers, along with end-user workstations, be placed in the Campus functional area. |
| 11. | A Cisco’s SAFE architecture design blueprint recommends that firewalls be placed in the Internet Connectivity module. |
| 12. | B, C, D Servers, routers, switches, and applications are all targets for security exploitation. Hubs are not generally a risk because of their lack of management features. |
| 13. | B Although a Syslog server is typically used to log security data, only the IDS actually acts like an alarm system. |
| 14. | E E-Commerce modules are similar to Internet Connectivity modules; both employ IDS, firewalls, host hardening, and DMZ networks. |
| 15. | D A Syslog server is the preferred server to log security-related information from network devices and IDSs. |
| 16. | A The NTP (Network Time Protocol) provides for accurate time reporting when configured on each network device and a central server. |
| 17. | B Centrex is a service purchased, generally on a monthly fee, to provide services commonly provided by a PBX. |
| 18. | B Encryption can help keep data confidential. |
| 19. | B Every secure network security design starts with a security policy relevant to the organization. |
| 20. | B A DoS (denial-of-service) attack can render a host unreachable by valid requests and cause network slowdowns. |
|