Review Questions

1. 

Which of the following devices is the most capable of providing infrastructure security?

  1. Hub

  2. Switch

  3. Router

  4. Modem

c. routers can be configured in many instances to act as packet-filteringfirewalls. when configured properly, they can prevent unauthorizedports from being opened.

2. 

A packet filter performs which function?

  1. Prevents unauthorized packets from entering the network

  2. Allows all packets to leave the network

  3. Allows all packets to enter a network

  4. Eliminates collisions in the network

a. packet filters prevent unauthorized packets from entering or leavinga network. packet filters are a type of firewall that block specified porttraffic.

3. 

Which device stores information about destinations in a network?

  1. Hub

  2. Modem

  3. Firewall

  4. Router

d. routers store information about network destinations in routingtables. these tables contain information about known hosts on bothsides of the router.

4. 

Which device acts primarily as a tool to improve network efficiency?

  1. Hub

  2. Switch

  3. Router

  4. PBX

b. switches create virtual circuits between systems in a network. thesevirtual circuits are somewhat private and reduce network trafficwhen used.

5. 

Which device is often used to integrate voice and data services onto a single WAN?

  1. Router

  2. PBX

  3. HUB

  4. Server

b. many modern pbx or private branch exchange systems integratevoice and data onto a single data connection to your phone serviceprovider. in some cases, this allows an overall reduction in costs ofoperations. these connections are made using existing network connections such as a t1 or t3 network.

6. 

Which protocol is widely used today as a transport protocol for Internet dial-up connections?

  1. SLIP

  2. PPP

  3. PPTP

  4. L2TP

b. slip connections have largely been replaced by ppp connections indial-up internet connections. slip passes only tcp/ip traffic, and pppcan pass multiple protocols.

7. 

Which protocol is unsuitable for WAN VPN connections?

  1. PPP

  2. PPTP

  3. L2TP

  4. IPSec

a. ppp provides no security and all activities are unsecure. ppp isprimarily intended for dial-up connections and should never be usedfor vpn connections.

8. 

Which protocol is not a tunneling protocol but is used by tunneling protocols for network security?

  1. IPSec

  2. PPTP

  3. L2TP

  4. L2F

a. ipsec provides network security for tunneling protocols. ipseccan be used with many different protocols besides tcp/ip, and it hastwo modes of security.

9. 

A socket is a combination of which components?

  1. TCP and port number

  2. UDP and port number

  3. IP and session number

  4. IP and port number

d. a socket is a combination of ip address and port number. thesocket identifies which application will respond to the network request.

10. 

Which protocol is becoming the newest standard for Internet mail applications?

  1. SMTP

  2. POP

  3. IMAP

  4. IGMP

c. imap is becoming the most popular standard for e-mail clientsand is replacing pop protocols for mail systems. imap allows mail tobe forwarded and stored in information areas called stores.

11. 

Which protocol is primarily used for network maintenance and destination information?

  1. ICMP

  2. SMTP

  3. IGMP

  4. Router

a. icmp is used for destination and error reporting functions intcp/ip. icmp is routable and is used by programs such as ping andtraceroute.

12. 

Which protocol is used for group messages or multicast messaging?

  1. SMTP

  2. SNMP

  3. IGMP

  4. L2TP

c. igmp is used for group messaging and multicasting. igmp protocolmaintains a list of systems that belong to a message group. whena message is sent to a particular group, each system receives anindividual copy.

13. 

Which device monitors network traffic in a passive manner?

  1. Sniffer

  2. IDS

  3. Firewall

  4. Web browser

a. sniffers monitor network traffic and display traffic in real time.sniffers, also called network monitors, were originally designed fornetwork maintenance and troubleshooting.

14. 

Which system performs active network monitoring and analysis and can take proactive steps to protect a network?

  1. IDS

  2. Sniffer

  3. Router

  4. Switch

a. ids are used to protect and report network abnormalities to anetwork administrator or system. an ids works with audit files andrules-based processing to determine how to act in the event of anunusual situation on the network.

15. 

Which media is broken down into seven categories depending on capability?

  1. Coax

  2. UTP

  3. Infrared

  4. Fiber optic cable

b. utp is broken down into seven categories that define bandwidthand performance. the most common category is cat 5, whichallows 100mbps bandwidth. cat 5 cabling is most frequently usedwith 100base-t networks.

16. 

Which media is the least susceptible to interception or tapping?

  1. Coax

  2. UTP

  3. STP

  4. Fiber

d. fiber networks are considered the most secure, although they canbe tapped. fiber networks use a plastic or glass conductor and passlight waves generated by a laser.

17. 

Which media offers line-of-sight broadband and baseband capabilities?

  1. Coax

  2. Infrared

  3. Microwave

  4. UTP

c. microwave communications systems can offer huge bandwidthand operate in either baseband or broadband capabilities. basebandcommunications is a single channel, while broadband is a multi- channel environment.

18. 

Which media is used primarily for backup and archiving purposes?

  1. Tape

  2. CD-R

  3. Memory stick

  4. Removable hard drives

a. the most common backup and archiving media in large systems istape. tape provides the highest density storage in the smallest packageof the choices given. cd-r and removable hard drives may also beused, but they generally do not have the storage capacity of equivalenttape cartridges.

19. 

Which media is susceptible to viruses?

  1. Tape

  2. Memory stick

  3. CD-R

  4. All of the above

d. all of these devices can store and pass viruses to uninfected systems. make sure that all files are scanned for viruses before they arecopied to these media.

20. 

Which device is used for access control as well as storage of information?

  1. CD-R

  2. Smart card

  3. Flash card

  4. Tape

b. smart cards are used for access control, and they can contain asmall amount of information. smart cards are replacing magneticcards, in many instances, because they can store additional personalinformation and are harder to copy or counterfeit.

Answers

1. 

C. Routers can be configured in many instances to act as packet-filtering firewalls. When configured properly, they can prevent unauthorized ports from being opened.

2. 

A. Packet filters prevent unauthorized packets from entering or leaving a network. Packet filters are a type of firewall that block specified port traffic.

3. 

D. Routers store information about network destinations in routing tables. These tables contain information about known hosts on both sides of the router.

4. 

B. Switches create virtual circuits between systems in a network. These virtual circuits are somewhat private and reduce network traffic when used.

5. 

B. Many modern PBX or Private Branch Exchange systems integrate voice and data onto a single data connection to your phone service provider. In some cases, this allows an overall reduction in costs of operations. These connections are made using existing network connections such as a T1 or T3 network.

6. 

B. SLIP connections have largely been replaced by PPP connections in dial-up Internet connections. SLIP passes only TCP/IP traffic, and PPP can pass multiple protocols.

7. 

A. PPP provides no security and all activities are unsecure. PPP is primarily intended for dial-up connections and should never be used for VPN connections.

8. 

A. IPSec provides network security for tunneling protocols. IPSec can be used with many different protocols besides TCP/IP, and it has two modes of security.

9. 

D. A socket is a combination of IP address and port number. The socket identifies which application will respond to the network request.

10. 

C. IMAP is becoming the most popular standard for e-mail clients and is replacing POP protocols for mail systems. IMAP allows mail to be forwarded and stored in information areas called stores.

11. 

A. ICMP is used for destination and error reporting functions in TCP/IP. ICMP is routable and is used by programs such as Ping and Traceroute.

12. 

C. IGMP is used for group messaging and multicasting. IGMP protocol maintains a list of systems that belong to a message group. When a message is sent to a particular group, each system receives an individual copy.

13. 

A. Sniffers monitor network traffic and display traffic in real time. Sniffers, also called network monitors, were originally designed for network maintenance and troubleshooting.

14. 

A. IDS are used to protect and report network abnormalities to a network administrator or system. An IDS works with audit files and rules-based processing to determine how to act in the event of an unusual situation on the network.

15. 

B. UTP is broken down into seven categories that define bandwidth and performance. The most common category is CAT 5, which allows 100Mbps bandwidth. CAT 5 cabling is most frequently used with 100Base-T networks.

16. 

D. Fiber networks are considered the most secure, although they can be tapped. Fiber networks use a plastic or glass conductor and pass light waves generated by a laser.

17. 

C. Microwave communications systems can offer huge bandwidth and operate in either baseband or broadband capabilities. Baseband communications is a single channel, while broadband is a multi- channel environment.

18. 

A. The most common backup and archiving media in large systems is tape. Tape provides the highest density storage in the smallest package of the choices given. CD-R and removable hard drives may also be used, but they generally do not have the storage capacity of equivalent tape cartridges.

19. 

D. All of these devices can store and pass viruses to uninfected systems. Make sure that all files are scanned for viruses before they are copied to these media.

20. 

B. Smart cards are used for access control, and they can contain a small amount of information. Smart cards are replacing magnetic cards, in many instances, because they can store additional personal information and are harder to copy or counterfeit.



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net