CISC 5009 - HW 4
Frame Relay
A PVC packet-switching technology that offers WAN communication over a fast, reliable, digital link. It was developed from X.25 and ISDN technology.
Asynchronous Transfer Mode (ATM)
A cell-based packet-switching technology in which the cells are of a fixed length rather than typical packet-based systems that use variable length packets.
Committed Information Rate (CIR)
A guaranteed minimum transmission rate offered by the service provider
Synchronous Optical Network (SONET)
A high-speed, baseband digital networking standard that specifies incrementally increasing data rates across fiber-optic links
virtual circuit
A logical sequence of connections with bandwidth allocated for a specific transmission pathway
Frame Relay
A point-to-point permanent virtual circuit (PVC) technology that offers WAN communications over a fast, reliable, digital packet-switching network
Point-to-Point Protocol (PPP)
A remote access protocol that supports many protocols and is used to carry data over a variety of network connections
Which of the following is a guideline for creating a security policy?
A security policy should be enforceable.
Which procedure specifies what resources users can access and the tasks they can perform on a network?
Authorization
A rootkit is a self-replicating program that masks itself as a valid program but is actually a type of malware.
False
A router is a CSU/DSU device. (T/F)
False
Network Control Protocol is responsible for the setup of a PPP connection, as well as the termination of a connection when it has ended. (T/F)
False
T-Carrier lines only require a CSU/DSU on the customer's side of the connection. (T/F)
False
You don't need to physically secure your servers as long as you use a good, strong password for your accounts.
False
Source address Protocol
Firewalls can filter packets based on which of the following? (Choose all that apply.) Source address Protocol OS Context
Which Windows domain-based protocol provides mutual authentication between devices?
Kerberos
Which protocol is used for dial-up and to create VPNs?
Point-to-Point Tunneling Protocol
Which form of authentication involves the exchange of a password-like key that must be entered on both devices?
Preshared key
Although a frame relay connection is established in much the same way that a T1 connection is, which of the following is an essential distinction between the two technologies?
T1 uses point-to-point, while frame relay makes use of virtual circuits.
Customer Premises Equipment (CPE)
The _______________ must be able to send data in the correct format onto the connection that makes up the local loop and receives data coming from that connection.
Data Terminal Equipment (DTE)
The device that passes data from the customer LAN to the DCE, usually a router
Data Circuit-terminating Equipment (DCE)
The device that sends data to (and receives data from) the local loop, usually a CSU/DSU or modem
If the minimum password length on a Windows system is set to zero, what does that mean?
The user can use a blank password.
A honeypot is configured to entice attackers and allows administrators to get information about the attack techniques being used.
True
A security policy should clearly state the desired rules, even if they cannot be enforced. (T/F)
True
IPsec functions by making an association between two communicating devices and can use a preshared key for authentication
True
Multiprotocol Label Switching (MPLS) supports both IPv4 and IPv6, as well as other network layer protocols. (T/F)
True
Packet-switched WANs use virtual circuits to ensure that packets are delivered reliably and at the agreed-on bandwidth level. (T/F)
True
How do virtual private networks ensure privacy?
Tunneling
Intrusion Detection System (IDS)
What can be used to monitor network traffic for malicious packets and report identified security breaches to a management station?
Link Control Protocol (LCP)
What device allows you to capture packets and determine which protocols are running?
Protocol Analyzer (Sniffer)
What device allows you to capture packets and determine which protocols are running?
Time Division Multiplexing (TDM)
What is the signaling method used to allocate time slots for each channel in a T-carrier line called?
port scanner
What tool can be used to determine which TCP and UDP ports are available on a particular computer or device?
EFS BitLocker TrueCrypt
Which of the following can be used to secure data on disk drives? (Choose all that apply.) EFS VPN IPSec BitLocker TrueCrypt
Multiplexing
Which of the following combines several communication streams into a single faster communication stream?
Circuit switched VPN over POTS Packet switched
Which of the following is a common WAN connection method? (Choose all that apply.) Circuit switched Packet leased VPN over POTS Packet switched
knowledge possession inherence
Which of the following is a credential category used in multi-factor authentication? (Choose all that apply.) authority knowledge rank possession inherence
CSU/DSU Router
Which of the following is a device used to make WAN connections? (Choose all that apply.) 10BaseT hub CSU/DSU Router Switch
Kerberos Digital certificates
Which of the following is a method IPsec uses to authenticate the identity of communicating devices? (Choose all that apply.) Multishared key Kerberos PAM Digital certificates
strongest wireless encryption standard requires PMF backward compatible
Which of the following is true about WPA3? (Choose all that apply.) strongest wireless encryption standard uses TKIP requires PMF backward compatible has only the Enterprise variation
What's being protected? From whom should data be protected?
Which of the following questions must be answered before determining what level of security a network requires? (Choose all that apply.) What tools are used to attack the network? What's being protected? From whom should data be protected? How much data is on the network?
Frame relay X.25
Which of the following technologies provides permanent virtual circuits? (Choose all that apply.) PSTN Frame relay X.25 ISDN
Frame Relay
Which of the following technologies uses packet switching?
PPTP SSTP L2TP
Which of these protocols is used for VPNs? (Choose all that apply.) PPTP WEP SSTP L2TP ICMP
physical security
Which phrase from the following list best completes the next sentence? "If there is access to the equipment, there is no _________________"
Demarcation point
Which term best describes the place in a WAN connection where the customer's responsibility ends and the provider's responsibility begins?
WiMAX
Which wireless WAN technology has a standard for fixed and mobile devices?
What type of policy defines the methods involved when a user signs in to the network?
authentication
You have purchased a network-based IDS. You have been tasked with deploying the device in a location where the entire network can be protected. Where should you deploy it?
demilitarized zone
Which facet of securing access to network data makes data unusable to anyone except authorized users?
encryption
What is created when a packet is encapsulated with additional headers to allow an encrypted packet to be correctly routed by Internet devices?
tunnel
Which of the following is NOT a guideline of a security policy?
uses legal terminology to protect the organization.