What important factor listed below differentiates Frame Relay from X.25?
During a security assessment of a wireless network, Jim discovers that LEAP is in use on a network using WPA. What recommendation should Jim make?
Ben has connected his laptop to his tablet PC using an 802.11g connection. What wireless network mode has he used to connect these devices?
Lauren’s and Nick’s PCs simultaneously send traffic by transmitting at the same time. What network term describes the range of systems on a network that could be affected by this same issue?
Sarah is manually reviewing a packet capture of TCP traffic and finds that a system is setting the RST flag in the TCP packets it sends repeatedly during a short period of time. What does this flag mean in the TCP packet header?
Gary is deploying a wireless network and wants to deploy the fastest possible wireless technology. Of the 802.11 standards listed below, which is the fastest 2.4 GHz option he has?
What common applications are associated with each of the following TCP ports: 23, 25, 143, and 515?
Chris is configuring an IDS to monitor for unencrypted FTP traffic. What ports should Chris use in his configuration?
FHSS, DSSS, and OFDM all use what wireless communication method that occurs over multiple frequencies simultaneously?
Which authentication protocol commonly used for PPP links encrypts both the username and password and uses a challenge/response dialog that cannot be replayed and periodically reauthenticates remote systems throughout its use in a session?
Which of the following options is not a common best practice for securing a wireless network?
What network topology is shown in the image below?
Chris is designing layered network security for his organization. Using the diagram below, answer questions 13 through 15.
What type of firewall design is shown in the diagram?
If the VPN grants remote users the same access to network and system resources as local workstations have, what security issue should Chris raise?
If Chris wants to stop cross-site scripting attacks against the web server, what is the best device for this purpose, and where should he put it?
Susan is deploying a routing protocol that maintains a list of destination networks with metrics that include the distance in hops to them and the direction traffic should be sent to them. What type of protocol is she using?
Ben has configured his network to not broadcast a SSID. Why might Ben disable SSID broadcast, and how could his SSID be discovered?
What network tool can be used to protect the identity of clients while providing Internet access by accepting client requests, altering the source addresses of the requests, mapping requests to clients, and sending the modified requests out to their destination?
During troubleshooting, Chris uses the nslookup
command to check the IP address of a host he is attempting to connect to. The IP he sees in the response is not the IP that should resolve when the lookup is done. What type of attack has likely been conducted?
A remote access tool that copies what is displayed on a desktop PC to a remote computer is an example of what type of technology?
Which email security solution provides two major usage modes: (1) signed messages that provide integrity, sender authentication, and nonrepudiation; and (2) an enveloped message mode that provides integrity, sender authentication, and confidentiality?
During a security assessment, Jim discovers that the organization he is working with uses a multilayer protocol to handle SCADA systems and recently connected the SCADA network to the rest of the organization’s production network. What concern should he raise about serial data transfers carried via TCP/IP?
What type of key does WEP use to encrypt wireless communications?
An attack that causes a service to fail by exhausting all of a system’s resources is what type of attack?
What speed and frequency range is used by 802.11n?
The Address Resolution Protocol (ARP) and the Reverse Address Resolution Protocol (RARP) operate at what layer of the OSI model?
Which of the following is a converged protocol that allows storage mounts over TCP, and which is frequently used as a lower-cost alternative to Fibre Channel?
Chris is building an Ethernet network and knows that he needs to span a distance of over 150 meters with his 1000Base-T network. What network technology should he use to help with this?
Lauren’s organization has used a popular instant messaging service for a number of years. Recently, concerns have been raised about the use of instant messaging. Using the diagram below, answer questions 29 through 31 about instant messaging.
What protocol is the instant messaging traffic most likely to use based on the diagram?
What security concern does sending internal communications from A to B cause?
How could Lauren’s company best address a desire for secure instant messaging for users of internal systems A and C?
Which of the following drawbacks is a concern when multilayer protocols are allowed?
What network topology is shown in the image below?
Chris uses a cellular hot spot (modem) to provide Internet access when he is traveling. If he leaves the hot spot connected to his PC while his PC is on his organization’s corporate network, what security issue might he cause?
In her role as an information security professional, Susan has been asked to identify areas where her organization’s wireless network may be accessible even though it isn’t intended to be. What should Susan do to determine where her organization’s wireless network is accessible?
The DARPA TCP/IP model’s Application layer matches up to what three OSI model layers?
One of Susan’s attacks during a penetration test involves inserting false ARP data into a system’s ARP cache. When the system attempts to send traffic to the address it believes belongs to a legitimate system, it will instead send that traffic to a system she controls. What is this attack called?
Sue modifies her MAC address to one that is allowed on a network that uses MAC filtering to provide security. What is the technique Sue used, and what non-security issue could her actions cause?
Jim’s audit of a large organization’s traditional PBX showed that Direct Inward System Access (DISA) was being abused by third parties. What issue is most likely to lead to this problem?
SMTP, HTTP, and SNMP all occur at what layer of the OSI model?
Lauren uses the ping utility to check whether a remote system is up as part of a penetration testing exercise. If she wants to filter ping out by protocol, what protocol should she filter out from her packet sniffer’s logs?
Lauren wants to provide port-based authentication on her network to ensure that clients must authenticate before using the network. What technology is an appropriate solution for this requirement?
Ben has deployed a 1000Base-T 1 gigabit network and needs to run a cable to another building. If Ben is running his link directly from a switch to another switch in that building, what is the maximum distance Ben can cover according to the 1000Base-T specification?
Jim’s remote site has only ISDN as an option for connectivity. What type of ISDN should he look for to get the maximum speed possible?
SPIT attacks target what technology?
What does a bluesnarfing attack target?
Which of the following options includes standards or protocols that exist in layer 6 of the OSI model?
What network topology is shown below?
There are four common VPN protocols. Which group of four below contains all of the common VPN protocols?
What network technology is best described as a token-passing network that uses a pair of rings with traffic flowing in opposite directions?
Which OSI layer includes electrical specifications, protocols, and interface standards?
Ben is designing a Wi-Fi network and has been asked to choose the most secure option for the network. Which wireless security standard should he choose?
If your organization needs to allow attachments in email to support critical business processes, what are the two best options for helping to avoid security problems caused by attachments?
.zip
) file attachments.Segmentation, sequencing, and error checking all occur at what layer of the OSI model that is associated with SSL, TLS, and UDP?
The Windows ipconfig
command displays the following information:
BC-5F-F4-7B-4B-7D
What term describes this, and what information can be gathered from it?
Chris has been asked to choose between implementing PEAP and LEAP for wireless authentication. What should he choose, and why?
Ben is troubleshooting a network and discovers that the NAT router he is connected to has the 192.168.x.x subnet as its internal network and that its external IP is 192.168.1.40. What problem is he encountering?
What is the default subnet mask for a Class B network?
Jim’s organization uses a traditional PBX for voice communication. What is the most common security issue that its internal communications are likely to face, and what should he recommend to prevent it?
What common security issue is often overlooked with cordless phones?
Lauren’s organization has deployed VoIP phones on the same switches that the desktop PCs are on. What security issue could this create, and what solution would help?
Which type of firewall can be described as “a device that filters traffic based on its source, destination and the port it is sent from or is going to”?
A phreaking tool used to manipulate line voltages to steal long-distance service is known as what type of box?
Data streams occur at what three layers of the OSI model?
Chris needs to design a firewall architecture that can support separately a DMZ, a database, and a private internal network. What type of design should he use, and how many firewalls does he need?
Lauren’s networking team has been asked to identify a technology that will allow them to dynamically change the organization’s network by treating the network like code. What type of architecture should she recommend?
Jim’s organization uses fax machines to receive sensitive data. Since the fax machine is located in a public area, what actions should Jim take to deal with issues related to faxes his organization receives?
Cable modems, ISDN, and DSL are all examples of what type of technology?
What type of firewall design is shown in the image below?
During a review of her organization’s network, Angela discovered that it was suffering from broadcast storms and that contractors, guests, and organizational administrative staff were on the same network segment. What design change should Angela recommend?
ICMP, RIP, and network address translation all occur at what layer of the OSI model?
Use the following scenario to help guide your answers in the following three questions.
Ben is an information security professional at an organization that is replacing its physical servers with virtual machines. As the organization builds its virtual environment, it is decreasing the number of physical servers it uses while purchasing more powerful servers to act as the virtualization platforms.
The IDS Ben is responsible for is used to monitor communications in the data center using a mirrored port on the data center switch. What traffic will Ben see once the majority of servers in the data center have been virtualized?
The VM administrators recommend enabling cut and paste between virtual machines. What security concern should Ben raise about this practice?
Ben is concerned about exploits that allow VM escape. What option should Ben suggest to help limit the impact of VM escape exploits?
WPA2’s Counter Mode Ciper Block Chaining Message Authentication Mode Protocol (CCMP) is based on which common encryption scheme?
When a host on an Ethernet network detects a collision and transmits a jam signal, what happens next?
IPX, AppleTalk, and NetBEUI are all examples of what?
What is the speed of a T3 line?
What type of firewall design does the image below show?
What challenge is most common for endpoint security system deployments?
What type of address is 127.0.0.1?
Susan is writing a best practices statement for her organizational users who need to use Bluetooth. She knows that there are many potential security issues with Bluetooth and wants to provide the best advice she can. Which of the following sets of guidance should Susan include?
What type of firewall is known as a second-generation firewall?
Steve has been tasked with implementing a network storage protocol over an IP network. What storage-centric converged protocol is he likely to use in his implementation?
What type of network device modulates between an analog carrier signal and digital information for computer communications?
Which list presents the layers of the OSI model in the correct order?
A denial of service (DoS) attack that sends fragmented TCP packets is known as what kind of attack?
Modern dial-up connections use what dial-up protocol?
One of the findings that Jim made when performing a security audit was the use of non-IP protocols in a private network. What issue should Jim point out that may result from the use of these non-IP protocols?
Angela needs to choose between EAP, PEAP, and LEAP for secure authentication. Which authentication protocol should she choose and why?
Lauren has been asked to replace her organization’s PPTP implementation with an L2TP implementation for security reasons. What is the primary security reason that L2TP would replace PPTP?
Jim is building a research computing system that benefits from being part of a full mesh topology between systems. In a five-node full mesh topology design, how many connections will an individual node have?
What topology correctly describes Ethernet?
What type of attack is most likely to occur after a successful ARP spoofing attempt?
What speed is Category 3 UTP cable rated for?
What issue occurs when data transmitted over one set of wires is picked up by another set of wires?
What two key issues with the implementation of RC4 make Wired Equivalent Privacy (WEP) even weaker than it might otherwise be?
Chris is setting up a hotel network, and needs to ensure that systems in each room or suite can connect to each other, but systems in other suites or rooms cannot. At the same time, he needs to ensure that all systems in the hotel can reach the Internet. What solution should he recommend as the most effective business solution?
During a forensic investigation, Charles is able to determine the Media Access Control address of a system that was connected to a compromised network. Charles knows that MAC addresses are tied back to a manufacturer or vendor and are part of the fingerprint of the system. To which OSI layer does a MAC address belong?
Ben knows that his organization wants to be able to validate the identity of other organizations based on their domain name when receiving and sending email. What tool should Ben recommend?