Review Questions

 < Free Open Study > 



1. 

Name the minimum category cable type that can be used to support 10BaseT.

  1. Category3.

  2. RJ-11.

  3. Catagory4.

  4. Category5.

correct answer = a the minimum cable type needed to support 10baset is category3. an rj-11 phone connector is used for earlier categories of utp to connect a modem to a typical phone jack or your phone to a phone jack. catagory4 and category5 cable types do support 10baset ethernet specifications. however, they are not the minimum category type needed to support 10baset.

2. 

Which IEEE specification is concerned primarily with security?

  1. 802.3.

  2. 802.5.

  3. 802.10.

  4. 802.11.

correct answer = c 802.3 is concerned with carrier-sense multiple access with collision detection in local area ethernet networks. the 802.5 specification is for token ring lans. 802.11 is an ieee specification for wireless communications.

3. 

Which type of network cabling is the most difficult to tap into and considered the most secure?

  1. Shielded twisted pair.

  2. Twisted pair.

  3. Coax.

  4. Fiber.

correct answer = d fiber-optic cable is much more difficult to tap into than other types of network cable. special equipment and skilled hands are required to carry out such a task. this is not the case with twisted pair, shielded twist pair, and coaxial types of cable.

4. 

Which statement is true regarding firewalls?

  1. They will protect your internal network from a virus that resides on a workstation on your internal network.

  2. If properly configured, a firewall will protect an internal network from an external network.

  3. Firewalls are used to protect your internal network from unauthorized external access through dial-up modem connections.

  4. Firewalls are used to protect internal server-room computers from external natural disasters.

correct answer = b properly configured firewalls will protect an internal network from an external network. an antivirus program and updated operating system service packs would be used to protect your internal network from a virus that resides on workstations on your internal network. firewalls do not provide protection through dial-up modem connections nor do they protect against natural disasters.

5. 

Which of the following describe an FDDI ring? (Choose three)

  1. Offer up to 100Mbps data transmission speeds.

  2. Are composed of dual rings with data traveling in opposite directions.

  3. Can serve as a network backbone.

  4. FDDI is the easiest topology to tap into.

  5. FDDI uses CSMA/CD technology.

correct answers = a, b, and c answers a, b, and c are all true statements regarding fddi rings. option d is a sort of a trick. fddi uses fiber cable, which as you are already aware is more difficult to tap into than most other cable types. fddi uses token passing technology not csma/cd (carrier-sense multiple access with collision detection.) csma/cd is used in ethernet networks.

6. 

Which of the following choices forms a sort of tunnel for two hosts to communicate?

  1. Packet filter.

  2. Circuit gateway.

  3. Application proxy.

  4. FDDI.

correct answer = b a circuit gateway forms a sort of tunnel through a firewall allowing two specified hosts to interact. packet filters examine udp, tcp ports, and packet header information. they can identify good from bad packet information. application proxies (or gateways) are concerned more with specific applications and actual data. fddi is a network topology standard that utilizes dual fiber-optic rings.

7. 

Of the following protocols, which protocol uses a one-way hash function to assist with the authentication process?

  1. Password Authentication Protocol (PAP).

  2. Challenge-Handshake Authentication Protocol (CHAP).

  3. Point-To-Point Protocol (PPP).

  4. Serial Line Internet Protocol (SLIP).

correct answer = b chap uses a secret one-way hash value that is generated by the requester and sent to the server. pap is a basic type of authentication where a username and password are transmitted unencrypted across a network to an authenticating host. ppp is a full-duplex serial communication protocol that operates at the data link layer of the osi reference model. serial line internet protocol (slip) is an older tcp/ip communications protocol used to connect two computer systems.

8. 

Which of the following practices should be followed in order to harden an internal network from outside influences? (Choose four)

  1. Apply the most recent manufacturer's hot-fixes and service packs.

  2. Block TCP port 139 and UDP ports 137 and 138.

  3. Disable (stop) all services and unbind all protocols on all internal network workstations.

  4. Enable a strong password structure.

  5. Enable auditing.

correct answers = a, b, d, and e the only incorrect answer to this question is c. if you chose answer c, please read the entire chapter again. if you disable (stop) all services and unbind all protocols on all internal network workstations, your workstations will not connect to a network and your operating system will not function.

9. 

Which of the following protocols is used to map or 'resolve' an IP address to a system's physical hardware address?

  1. HTTPS.

  2. SDLC.

  3. HDLC.

  4. ARP.

correct answer = d address resolution protocol (arp) is a protocol used to map an ip (internet protocol) address at the network layer of the osi model to a physical hardware address at the mac (media access control) sublayer. hypertext transport protocol secure (https) is a secure protocol used to transmit messages over the internet. sdlc is based on a primary/secondary communications model where a secure connection is established between a mainframe (host) and a client. high level data link control (hdlc) is a transmission protocol that operates at the data link layer (layer 2) of the osi model.

10. 

Which of the following provides a type of firewall by hiding internal IP addresses from outside networks?

  1. ARP.

  2. NAT.

  3. PAP.

  4. RPC.

correct answer = b network address translation (nat) is an internet standard most often used with routers to provide firewall security by hiding an internal private networks range of ip addresses from outside networks. address resolution protocol (arp) is a protocol used to map an ip (internet protocol) address at the network layer of the osi mode, to a physical hardware address at the mac (media access control) sublayer. password authentication protocol (pap) is a basic type of authentication where a username and password are transmitted unencrypted across a network to an authenticating host. secure remote procedure call (rpc) is essentially a protocol that is used to allow a client-side application program to execute or request a service from a server computer without being concerned with network intricacies or server procedures.

11. 

Which device does not forward all broadcast traffic and has the ability to forward data packets to other networks based on IP address information?

  1. Bridge.

  2. Router.

  3. Hub.

  4. Repeater.

correct answer = b a router operates at the network layer of the osi reference model and has the ability to forward information based on a network or individual computer s tcp/ip address. a router has the ability to filter out broadcast traffic. bridges are limited in their capabilities. they forward packet information based on mac addresses. a bridge proliferates or broadcasts (passes traffic) to all network segments. this can often result in a broadcast storm that can slow or take down a network. a hub is a simple connection device that sends all data packets to all connected systems. a repeater is used to boost or regenerate the signals placed on a 10base2 or bus network. adding a repeater to your bus can extend the length of your entire bus network.

12. 

Which TCP port is HTTP associated with?

  1. 21.

  2. 25.

  3. 53.

  4. 80.

correct answer = d http traffic uses tcp port 80. ftp uses tcp port 21. smtp uses tcp port 25. dns uses udp port 53. please refer to table 4.2 .

13. 

Which intrusion detection device is used to lure and trap possible network attackers?

  1. False positive.

  2. Honey pot.

  3. False negative.

  4. DMZ.

correct answer = b the main goal of a honey pot or mouse trap if you will, is to trap, track, and record the trails of a possible attacker. a false positive is simply a report or an alert from an ids that details something other than an attack. a false negative error occurs when an ids completely misses legitimate misuse of or an attack on a system or resource mistaking it for normal activity. a demilitarized zone (dmz) is a neutral area between an internal network and the internet that typically contains one host system or a small network of systems.

14. 

What is the name used when access to part of an internal network is granted to outside venders and customers?

  1. Ethernet.

  2. Intranet.

  3. Ignorantnet .

  4. Extranet.

correct answer = d when part of an internal network or intranet has been made accessible to outside sources, that part of the internal network is referred to as an extranet. ethernet is a lan architecture technology developed by xerox that supports csma/cd. you should have learned this as a prerequisite to studying for security+. an intranet is a network that is considered private and separate from the outside world. it exists to connect the workings of an internal network. ignorantnet is an invalid selection.

15. 

Which of the following is a small plastic device that can be used for storage, authentication, or memory purposes?

  1. CD-R.

  2. Smart card.

  3. Intelligent token.

  4. Tape cartridge.

correct answer = b a smart card is a small plastic card that contains a microchip. it can be used for data storage and memory purposes as well as a security authentication device. a cd-r is an optical storage disk capable of storing large amounts of data. intelligent token is an invalid selection. although a tape cartridge is often used for data storage, it is not an authentication device nor is it used for memory purposes.

16. 

How long are IPv6 addresses?

  1. 16 bits.

  2. 32 bits.

  3. 64 bits.

  4. 128 bits.

correct answer = d ipv6 allows for ip addresses to be lengthened from the ipv4 limitation of 32 bits to 128 bits. ipv6 also allows for better authentication, privacy, and improved data delivery assurance. all other choices are invalid.

17. 

Which statement best describes a DMZ?

  1. Used to connect two pieces of cable.

  2. A DMZ should never be exposed to the Internet.

  3. Located behind a firewall and can be seen from the Internet.

  4. Located in front of firewall and can be accessed from the Internet.

correct answer = c the dmz sits between a private and a public network and can be made up of one or several systems that house web pages and non-critical company data that can be accessed from outside an intranet or lan. bnc and bnc barrel connectors are typically used to attach or connect a bus cable to a device or connect one piece of the bus cable to another. answers b and d are invalid.

18. 

How long are IPv6 addresses?

  1. 16 bits.

  2. 32 bits.

  3. 64 bits.

  4. 128 bits.

correct answer = d ipv6 allows for ip addresses to be lengthened from the ipv4 limitation of 32 bits to 128 bits. ipv6 also allows for better authentication, privacy, and improved data delivery assurance. all other choices are invalid.

19. 

FTP uses which TCP ports?

  1. 25.

  2. 20, 21.

  3. 23.

  4. 80.

correct answer = b ftp uses tcp ports 20 and 21. smtp uses tcp port 25. telnet uses tcp port 23. http uses tcp port 80. you d better know this for any security exam!

Answers

1. 

Correct answer = A

The minimum cable type needed to support 10BaseT is Category3. An RJ-11 phone connector is used for earlier categories of UTP to connect a modem to a typical phone jack or your phone to a phone jack. Catagory4 and Category5 cable types do support 10Baset Ethernet specifications. However, they are not the minimum category type needed to support 10BaseT.

2. 

Correct answer = C

802.3 is concerned with Carrier-Sense Multiple Access with Collision detection in local area Ethernet networks. The 802.5 specification is for Token Ring LANs. 802.11 is an IEEE specification for wireless communications.

3. 

Correct answer = D

Fiber-optic cable is much more difficult to tap into than other types of network cable. Special equipment and skilled hands are required to carry out such a task. This is not the case with twisted pair, shielded twist pair, and coaxial types of cable.

4. 

Correct answer = B

Properly configured firewalls will protect an internal network from an external network. An antivirus program and updated operating system service packs would be used to protect your internal network from a virus that resides on workstations on your internal network. Firewalls do not provide protection through dial-up modem connections nor do they protect against natural disasters.

5. 

Correct answers = A, B, and C

Answers A, B, and C are all true statements regarding FDDI rings. Option D is a sort of a trick. FDDI uses fiber cable, which as you are already aware is more difficult to tap into than most other cable types. FDDI uses token passing technology not CSMA/CD (Carrier-Sense Multiple Access with Collision Detection.) CSMA/CD is used in Ethernet networks.

6. 

Correct answer = B

A circuit gateway forms a sort of tunnel through a firewall allowing two specified hosts to interact. Packet filters examine UDP, TCP ports, and packet header information. They can identify good from bad packet information. Application proxies (or gateways) are concerned more with specific applications and actual data. FDDI is a network topology standard that utilizes dual fiber-optic rings.

7. 

Correct answer = B

CHAP uses a secret one-way hash value that is generated by the requester and sent to the server. PAP is a basic type of authentication where a username and password are transmitted unencrypted across a network to an authenticating host. PPP is a full-duplex serial communication protocol that operates at the Data Link layer of the OSI reference model. Serial Line Internet Protocol (SLIP) is an older TCP/IP communications protocol used to connect two computer systems.

8. 

Correct answers = A, B, D, and E

The only incorrect answer to this question is C. If you chose answer C, please read the entire chapter again. If you disable (stop) all services and unbind all protocols on all internal network workstations, your workstations will not connect to a network and your operating system will not function.

9. 

Correct answer = D

Address Resolution Protocol (ARP) is a protocol used to map an IP (Internet Protocol) address at the network layer of the OSI model to a physical hardware address at the MAC (Media access Control) sublayer. HyperText Transport Protocol Secure (HTTPS) is a secure protocol used to transmit messages over the Internet. SDLC is based on a primary/secondary communications model where a secure connection is established between a mainframe (host) and a client. High Level Data Link Control (HDLC) is a transmission protocol that operates at the Data Link layer (layer 2) of the OSI model.

10. 

Correct answer = B

Network Address Translation (NAT) is an Internet standard most often used with routers to provide firewall security by hiding an internal private networks range of IP addresses from outside networks. Address Resolution Protocol (ARP) is a protocol used to map an IP (Internet Protocol) address at the Network layer of the OSI mode, to a physical hardware address at the MAC (Media access Control) sublayer. Password Authentication Protocol (PAP) is a basic type of authentication where a username and password are transmitted unencrypted across a network to an authenticating host. Secure Remote Procedure Call (RPC) is essentially a protocol that is used to allow a client-side application program to execute or request a service from a server computer without being concerned with network intricacies or server procedures.

11. 

Correct answer = B

A router operates at the Network layer of the OSI reference model and has the ability to forward information based on a network or individual computer's TCP/IP address. A router has the ability to filter out broadcast traffic. Bridges are limited in their capabilities. They forward packet information based on MAC addresses. A bridge proliferates or broadcasts (passes traffic) to all network segments. This can often result in a broadcast storm that can slow or take down a network. A hub is a simple connection device that sends all data packets to all connected systems. A repeater is used to boost or regenerate the signals placed on a 10base2 or bus network. Adding a repeater to your bus can extend the length of your entire bus network.

12. 

Correct answer = D

HTTP traffic uses TCP port 80. FTP uses TCP port 21. SMTP uses TCP port 25. DNS uses UDP port 53. Please refer to Table 4.2.

13. 

Correct answer = B

The main goal of a honey pot or 'mouse trap' if you will, is to trap, track, and record the trails of a possible attacker. A false positive is simply a report or an alert from an IDS that details something other than an attack. A false negative error occurs when an IDS completely misses legitimate misuse of or an attack on a system or resource mistaking it for normal activity. A Demilitarized Zone (DMZ) is a neutral area between an internal network and the Internet that typically contains one host system or a small network of systems.

14. 

Correct answer = D

When part of an internal network or intranet has been made accessible to outside sources, that part of the internal network is referred to as an extranet. Ethernet is a LAN architecture technology developed by Xerox that supports CSMA/CD. You should have learned this as a prerequisite to studying for Security+. An intranet is a network that is considered private and separate from the outside world. It exists to connect the workings of an internal network. Ignorantnet is an invalid selection.

15. 

Correct answer = B

A smart card is a small plastic card that contains a microchip. It can be used for data storage and memory purposes as well as a security authentication device. A CD-R is an optical storage disk capable of storing large amounts of data. Intelligent token is an invalid selection. Although a tape cartridge is often used for data storage, it is not an authentication device nor is it used for memory purposes.

16. 

Correct answer = D

IPv6 allows for IP addresses to be lengthened from the IPv4 limitation of 32 bits to 128 bits. IPv6 also allows for better authentication, privacy, and improved data delivery assurance. All other choices are invalid.

17. 

Correct answer = C

The DMZ sits between a private and a public network and can be made up of one or several systems that house Web pages and non-critical company data that can be accessed from outside an intranet or LAN. BNC and BNC barrel connectors are typically used to attach or connect a bus cable to a device or connect one piece of the bus cable to another. Answers B and D are invalid.

18. 

Correct answer = D

IPv6 allows for IP addresses to be lengthened from the IPv4 limitation of 32 bits to 128 bits. IPv6 also allows for better authentication, privacy, and improved data delivery assurance. All other choices are invalid.

19. 

Correct answer = B

FTP uses TCP ports 20 and 21. SMTP uses TCP port 25. Telnet uses TCP port 23. HTTP uses TCP port 80. You'd better know this for any security exam!



 < Free Open Study > 



The Security+ Exam Guide. TestTaker's Guide Series
Security + Exam Guide (Charles River Media Networking/Security)
ISBN: 1584502517
EAN: 2147483647
Year: 2003
Pages: 136

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net