Telecommunications and Network Security Prep Test


1. 

A data network that operates across a relatively large geographic area defines what type of network?

  1. LAN

  2. MAN

  3. CAN

  4. WAN

image from book

2. 

The process of wrapping protocol information from one layer in the data section of another layer describes

  1. Data encryption

  2. Data encapsulation

  3. Data hiding

  4. TCP wrappers

image from book

3. 

The LLC and MAC are sublayers of what OSI model layer?

  1. Data Link

  2. Network

  3. Transport

  4. Session

image from book

4. 

The Ethernet protocol is defined at what layer of the OSI model and in which IEEE standard?

  1. Data Link Layer, 802.3

  2. Network Layer, 802.3

  3. Data Link Layer, 802.5

  4. Network Layer, 802.5

image from book

5. 

All the following are examples of packet-switched WAN protocols, except

  1. X.25

  2. Frame Relay

  3. ISDN

  4. SMDS

image from book

6. 

Which of the following is an example of a Class C IP address?

  1. 17.5.5.1

  2. 127.0.0.1

  3. 192.167.4.1

  4. 224.0.0.1

image from book

7. 

The TCP/IP Protocol Model consists of the following four layers:

  1. Application, Presentation, Session,Transport

  2. Application, Session, Network, Physical

  3. Application, Session, Host-to-HostTransport, Internet

  4. Application, Host-to-HostTransport, Internet, Link

 d. application, host-to-hosttransport, internet, link (or network). review thentcp/ip model.

8. 

Which of the following firewall architectures employs an external and internal router as well as a bastion host?

  1. Screening router

  2. Screened subnet

  3. Screened host gateway

  4. Dual-homed gateway

image from book

9. 

Which of the following is not a common VPN protocol standard?

  1. IPSec

  2. PPTP

  3. TFTP

  4. L2TP

image from book

10. 

A type of network attack in which TCP packets are sent from a spoofed source address with the SYN bit set describes

  1. Smurf

  2. Fraggle

  3. Teardrop

  4. SYN Flood

image from book

Answers

1. 

D. WAN. A LAN operates across a relatively small geographic area. MANs and CANs are LAN variations. Review “Wide area network (WAN).”

2. 

B. Data encapsulation. Data encapsulation wraps protocol information from one layer in the data section of another layer.The other choices are incorrect. Review “The OSI Reference Model.”

3. 

A. Data Link.The Data Link Layer is the only layer of the OSI model that defines sublayers (the Logical Link Control and Media Access Control sublayers). Review “Data Link Layer (Layer 2).”

4. 

A. Data Link Layer, 802.3. LAN protocols are defined at the Data Link Layer. IEEE 802.5 defines theToken-Ring standard. Review “Data Link Layer (Layer 2).”

5. 

C. ISDN. ISDN is circuit-switched. Packet-switched network technologies include X.25, Frame Relay, SMDS, ATM, and VoIP. Review “WAN technologies and protocols.”

6. 

C. 192.167.4.1. 17.5.5.1 is a Class A address, 127.0.0.1 is an interface loopback address, and 224.0.0.1 is a multicast address (Class D). Review “Internet Protocol (IP).”

7. 

D. Application, Host-to-HostTransport, Internet, Link (or Network). Review “ThenTCP/IP Model.”

8. 

B. Screened subnet.The screened subnet employs an external screening router, a dual-homed (or multi-homed) host, and a second internal screening router. Review “Firewall architectures.”

9. 

C. TFTP.TFTP is theTrivial FileTransfer Protocol, a basic variation of the FTP protocol that provides limited file transfer capabilities. It has absolutely nothing to do with VPNs. Review “Virtual Private Networks (VPNs).”

10. 

D. SYN Flood. Smurf attacks exploit vulnerabilities in the ICMP protocol. Fraggle attacks exploit vulnerabilities in the UDP protocol. ATeardrop attack exploits vulnerabilities in theTCP protocol by using the length and fragmentation offset fields. See “Network Attacks and Countermeasures.”




CISSP For Dummies
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net