This CISSP Telecommunications & Networking quiz assesses knowledge on network defense, Ethernet layers, and intrusion detection placement. It's designed to enhance understanding of network security principles and proactive defense tactics, essential for security professionals.
Redundant firewalls
Business continuity planning
Disallowing P2P traffic
Perimeter surveillance and intelligence gathering
Rate this question:
A denial-of-service attack on servers on a network
Hacking into a router
A virus outbreak saturating network capacity
A man-in-the-middle attack
Rate this question:
B and e
B, d, and e
A and c
A, c, and d
Rate this question:
On the network perimeter, to alert the network administrator of all suspicious traffic
On network segments with business-critical systems; e.g., demilitarized zones (DMZs) and on certain intranet segments
At the network operations center (NOC)
At an external service provider
Rate this question:
File server
IP phone
Security camera
All of the above
Rate this question:
Fiber optics provides higher bandwidth.
Fiber optics are more difficult to wiretap.
Fiber optics are immune to wiretap.
None. The two are equivalent; network security is independent from the physical layer.
Rate this question:
A boundary router
A firewall
A proxy server
None of the above
Rate this question:
Lack of physical access control
Demonstrably insecure standards
Implementation weaknesses
War driving
Rate this question:
Using an obscure SSID to confuse and distract an attacker
Not using any SSID at all to prevent an attacker from connecting to the network
Not broadcasting an SSID to make it harder to detect the WLAN
None of the above
Rate this question:
A and d
A, b, and e
A, b, c, d, and f
A, b, c, e, and f
Rate this question:
Gathers firewall logs for archiving
Aggregates logs from security devices and application servers looking for suspicious activity
Reviews access controls logs on servers and physical entry points to match user system authorization with physical access permissions
Coordination software for security conferences and seminars.
Rate this question:
Lack of authentication of servers, and thereby authenticity of records
Its latency, which enables insertion of records between the time when a record has expired and when it is refreshed
Th e fact that it is a simple, distributed, hierarchical database instead of a singular, relational one, thereby giving rise to the possibility of inconsistencies going undetected for a certain amount of time
Th e fact that addresses in e-mail can be spoofed without checking their validity in DNS, caused by the fact that DNS addresses are not digitally signed
Rate this question:
An open e-mail relay is a server that forward e-mail from domains other than the ones it serves.
Open e-mail relays are a principal tool for distribution of spam.
Using a blacklist of open e-mail relays provides a secure way for an e-mail administrator to identify open mail relays and fi lter spam.
An open e-mail relay is widely considered a sign of bad system administration.
Rate this question:
A network used solely for internal communications
An automatic security alerting tool for corporate networks
A group of dispersed, compromised machines controlled remotely for illicit reasons.
A type of virus
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.