Layer 1—Physical layer
Layer 2—Data-link layer
Layer 3—Network Layer
Layer 4—Transport Layer
Business continuity planning
Disallowing P2P traffic
Perimeter surveillance and intelligence gathering
A denial-of-service attack on servers on a network
Hacking into a router
A virus outbreak saturating network capacity
A man-in-the-middle attack
B and e
B, d, and e
A and c
A, c, and d
On the network perimeter, to alert the network administrator of all suspicious traffic
On network segments with business-critical systems; e.g., demilitarized zones (DMZs) and on certain intranet segments
At the network operations center (NOC)
At an external service provider
All of the above
Fiber optics provides higher bandwidth.
Fiber optics are more difficult to wiretap.
Fiber optics are immune to wiretap.
None. The two are equivalent; network security is independent from the physical layer.
A boundary router
A proxy server
None of the above
Lack of physical access control
Demonstrably insecure standards
Using an obscure SSID to confuse and distract an attacker
Not using any SSID at all to prevent an attacker from connecting to the network
Not broadcasting an SSID to make it harder to detect the WLAN
None of the above
A and d
A, b, and e
A, b, c, d, and f
A, b, c, e, and f
Gathers firewall logs for archiving
Aggregates logs from security devices and application servers looking for suspicious activity
Reviews access controls logs on servers and physical entry points to match user system authorization with physical access permissions
Coordination software for security conferences and seminars.
Lack of authentication of servers, and thereby authenticity of records
Its latency, which enables insertion of records between the time when a record has expired and when it is refreshed
Th e fact that it is a simple, distributed, hierarchical database instead of a singular, relational one, thereby giving rise to the possibility of inconsistencies going undetected for a certain amount of time
Th e fact that addresses in e-mail can be spoofed without checking their validity in DNS, caused by the fact that DNS addresses are not digitally signed
An open e-mail relay is a server that forward e-mail from domains other than the ones it serves.
Open e-mail relays are a principal tool for distribution of spam.
Using a blacklist of open e-mail relays provides a secure way for an e-mail administrator to identify open mail relays and fi lter spam.
An open e-mail relay is widely considered a sign of bad system administration.
A network used solely for internal communications
An automatic security alerting tool for corporate networks
A group of dispersed, compromised machines controlled remotely for illicit reasons.
A type of virus