CISSP For Dummies
1. | A data network that operates across a relatively large geographic area defines what type of network?
| |
2. | The process of wrapping protocol information from one layer in the data section of another layer describes
| |
3. | The LLC and MAC are sublayers of what OSI model layer?
| |
4. | The Ethernet protocol is defined at what layer of the OSI model and in which IEEE standard?
| |
5. | All the following are examples of packet-switched WAN protocols, except
| |
6. | Which of the following is an example of a Class C IP address?
| |
7. | The TCP/IP Protocol Model consists of the following four layers:
| |
8. | Which of the following firewall architectures employs an external and internal router as well as a bastion host?
| |
9. | Which of the following is not a common VPN protocol standard?
| |
10. | A type of network attack in which TCP packets are sent from a spoofed source address with the SYN bit set describes
| |
Answers
1. | D. WAN. A LAN operates across a relatively small geographic area. MANs and CANs are LAN variations. Review “Wide area network (WAN).” |
2. | B. Data encapsulation. Data encapsulation wraps protocol information from one layer in the data section of another layer.The other choices are incorrect. Review “The OSI Reference Model.” |
3. | A. Data Link.The Data Link Layer is the only layer of the OSI model that defines sublayers (the Logical Link Control and Media Access Control sublayers). Review “Data Link Layer (Layer 2).” |
4. | A. Data Link Layer, 802.3. LAN protocols are defined at the Data Link Layer. IEEE 802.5 defines theToken-Ring standard. Review “Data Link Layer (Layer 2).” |
5. | C. ISDN. ISDN is circuit-switched. Packet-switched network technologies include X.25, Frame Relay, SMDS, ATM, and VoIP. Review “WAN technologies and protocols.” |
6. | C. 192.167.4.1. 17.5.5.1 is a Class A address, 127.0.0.1 is an interface loopback address, and 224.0.0.1 is a multicast address (Class D). Review “Internet Protocol (IP).” |
7. | D. Application, Host-to-HostTransport, Internet, Link (or Network). Review “ThenTCP/IP Model.” |
8. | B. Screened subnet.The screened subnet employs an external screening router, a dual-homed (or multi-homed) host, and a second internal screening router. Review “Firewall architectures.” |
9. | C. TFTP.TFTP is theTrivial FileTransfer Protocol, a basic variation of the FTP protocol that provides limited file transfer capabilities. It has absolutely nothing to do with VPNs. Review “Virtual Private Networks (VPNs).” |
10. | D. SYN Flood. Smurf attacks exploit vulnerabilities in the ICMP protocol. Fraggle attacks exploit vulnerabilities in the UDP protocol. ATeardrop attack exploits vulnerabilities in theTCP protocol by using the length and fragmentation offset fields. See “Network Attacks and Countermeasures.” |
Категории