CISSP- Telecommunications & Networking

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Cindymurray
C
Cindymurray
Community Contributor
Quizzes Created: 8 | Total Attempts: 15,187
| Attempts: 726 | Questions: 15
Please wait...
Question 1 / 15
0 %
0/100
Score 0/100
1. A botnet can be characterized as

Explanation

Bots” and “botnets” are most insidious implementations of unauthorized,
remote control of compromised systems. Such machines are essentially
zombies controlled by ethereal entities from the dark places on the Internet. Page 749.

Submit
Please wait...
About This Quiz
CISSP- Telecommunications & Networking - Quiz

This CISSP Telecommunications & Networking quiz assesses knowledge on network defense, Ethernet layers, and intrusion detection placement. It's designed to enhance understanding of network security principles and proactive... see moredefense tactics, essential for security professionals. see less

2. A security event management (SEM) service performs the following function:

Explanation

SEM/SEIM systems have to understand a wide variety of diff erent
applications and network element (routers/switches) logs and formats; consolidate
these logs into a single database and then correlate events looking for clues to
unauthorized behaviors that would be otherwise inconclusive if observed in a single
log fi le. Page 751.

Submit
3. Which of the following end-point devices might be considered part of a converged IP network?

Explanation

Correct answer is d. See Figure 10.3, Page 740.

Submit
4. In which of the following situations is the network itself not a target of attack?

Explanation

Although the modifi cation of messages will often happen at
the higher network layers, networks can be set up to provide robustness or resilience
against interception and change of a message (man-in-the-middle attack) or
replay attacks. Ways to accomplish this can be based on encryption or checksums
on messages, as well as on access control measures for clients that would prevent
an attacker from gaining the necessary access to send a modifi ed message into the
network. Page 745.

Submit
5. In the OSI reference model, on which layer can Ethernet (IEEE 802.3) be described?

Explanation

Layer 2, the data-link layer, describes data transfer between
machines, for instance, by an Ethernet. Page 735.

Submit
6. What is the optimal placement for network-based intrusion detection systems (NIDSs)?

Explanation

Intrusion detection systems (IDS) monitor activity and send
alerts when they detect suspicious traffi c. Th ere are two broad classifi cations of IDS:
host-based IDS, which monitor activity on servers and workstations, and networkbased
IDS, which monitor network activity. Page 750.

Submit
7. Which of the following devices should not be part of a network's perimeter defense?

Explanation

Th e security perimeter is the fi rst line of protection between
trusted and untrusted networks. In general, it includes a fi rewall and router that
helps fi lter traffi c. Security perimeters may also include proxies and devices, such
as an intrusion detection system (IDS), to warn of suspicious traffi c. Th e defensive
perimeter extends out from these fi rst protective devices, to include proactive
defense such as boundary routers which can provide early warning of upstream
attacks and threat activities. Page 765.

Submit
8. Which of the following is an advantage of fiber-optic over copper cables from a security perspective?

Explanation

From a security perspective, fi ber optics’ immunity to electromagnetic
interference (EMI) and radio frequency interference (RFI) is important.
Because fi ber optics emit extremely small amounts of energy from the cable, data
cannot be as easily intercepted as information is transported through electric current
in wires. Page 762.

Submit
9. Which of the following is a principal security risk of wireless LANs?

Explanation

Wireless networks allow users to be mobile while remaining
connected to a LAN. Unfortunately, this allows unauthorized users greater access to the LAN as well. In fact, many wireless LANs can be accessed off of the organization’s
property by anyone with a wireless card in a laptop, which eff ectively
extends the LAN where there are no physical controls. Page 777.

Submit
10. Which of the following is the principal weakness of DNS (Domain Name System)?

Explanation

Authentication has been proposed but attempts to introduce
stronger authentication into DNS have not found wider acceptance. Authentication
services have been delegated upward to higher protocol layers. Applications in need
of guaranteeing authenticity cannot rely on DNS to provide such but will have to
implement a solution themselves. Page 818.

Submit
11. Which of the following are true statements about IPSec? a IPSec provides mechanisms for authentication and encryption. b   = IPSec provides mechanisms for nonrepudiation. c   = IPSec will only be deployed with IPv6. d   = IPSec authenticates hosts against each other. e   = IPSec only authenticates clients against a server. f   = IPSec is implemented in SSH and TLS.

Explanation

IP Security (IPSec) is a suite of protocols for communicating
securely with IP by providing mechanisms for authenticating and encryption.
Standard IPSec authenticates only hosts with each other. Page 804.

Submit
12. Which of the following are eff ective protective or countermeasures against a distributed denial-of-service attack? a = Redundant network layout; b = Secret fully qualifi ed domain names (FQDNs); c = Reserved bandwidth; d = Traffic filtering; e = Network address translation (NAT).

Explanation

Countermeasures to a denial-of-service attack include, but
are not limited to: multiple layers of fi rewalls, careful fi ltering on fi rewalls, routers
and switches, internal network access controls (NAC), redundant (diverse) network
connections, load balancing, reserved bandwidth (quality of service, which would
at least protect systems not directly targeted), and blocking traffi c from an attacker
on upstream router. Page 745.

Submit
13. Which of the following tactics might be considered a part of a proactive network defense?

Explanation

Ideally to counter an attack, network security must also be proactive,
anticipate, and oppose the attack against their infrastructure by interdicting
and disrupting an attack preemptively or in self-defense. Th is requires intelligence
on the threat, active surveillance at the perimeter and beyond, and the ability to
intercede upstream or disable a threat agent’s tools. Page 742.

Submit
14. Which of the following statements about open e-mail relays is incorrect?

Explanation

Although using blacklists as one indicator in spam fi ltering has
its merits, it is risky to use them as an exclusive indicator. Generally, they are run by
private organizations and individuals according to their own rules, they are able to
change their policies on a whim, they can vanish overnight for any reason, and they
can rarely be held accountable for the way they operate their lists. Page 827.

Submit
15. Which of the following confi gurations of a WLAN's SSID off ers adequate security protection?

Explanation

Correct answer is d. SSIDs are not for authentication. Page 778.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 22, 2012
    Quiz Created by
    Cindymurray
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A botnet can be characterized as
A security event management (SEM) service performs the following...
Which of the following end-point devices might be considered part of a...
In which of the following situations is the network itself not a...
In the OSI reference model, on which layer can Ethernet (IEEE 802.3)...
What is the optimal placement for network-based intrusion detection...
Which of the following devices should not be part of a network's...
Which of the following is an advantage of fiber-optic over copper...
Which of the following is a principal security risk of wireless LANs?
Which of the following is the principal weakness of DNS (Domain Name ...
Which of the following are true statements about IPSec? ...
Which of the following are eff ective protective or countermeasures...
Which of the following tactics might be considered a part of a...
Which of the following statements about open e-mail relays is...
Which of the following confi gurations of a WLAN's SSID off ers...
Alert!

Advertisement