Let's see how well you did on this test ... 1. DNS, FTP, TFTP, SNMP ...

mustardpruneNetworking and Communications

Oct 23, 2013 (3 years and 10 months ago)

407 views


Let's see how well you did on this test ...

1.

DNS, FTP, TFTP, SNMP are provided at what level of the OSI / ISO model?

Answer:

Application

So
rry
-

you had a wrong answer, please review details below.

Reference:
OSI/ISO
.

2.

The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers 6

is
which of the following?

Answer:

Presentation Layer

Sorry
-

you had a wrong answer, please review details below.

International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers and
Characteristics:

Physical Layer

Data Link Laye
r

Network Layer

Transport Layer

Session Layer

Presentation Layer

Applications Layer

Here's a great mnemonicfor the OSI model: "Please Do Not Trow Sausage Pizza Away".

Source: STEINER, Kurt,
Telecommunications and Network Security, Version 1, May 2002
,
CI
SSP Open Study Group (Domain Leader: skottikus), Page 12. Available at
www.cccure.org
.

Thanks to Rakesh Sud for providing this question and to Don Murdoch for providing extra
information.

3.

Which of the fol
lowing OSI layers does not provide confidentiality?

Answer:

Transport

Sorry
-

you had a wrong answer, please review details below.

The transport layer provides end
-
to
-
end data transport services and establishes the logical
connection between two communi
cating computers but it does not provide any confidentiality.
The presentation layer provides authentication and authorization services. The network layer
provides confidentiality, authentication, data integrity, and access control services. The session
la
yer provides confidentiality services through SSL and establishes the connections between
applications and allows checkpoint for restart/recovery.

Source: HARRIS, Shon,
All
-
In
-
One CISSP Certification Exam Guide
, McGraw
-
Hill/Osborne,
2002, chapter 7: Telecommunications and Network Security (page 351).

Thanks to Rhonda Farrell
-
Oller for reviewing this question.

4.

You are running a packet sniffer on a network and se
e a packet with a long string of "90 90 90
90...." in the middle of it traveling to an x86
-
based machine. This could be indicative of what?

Answer:

A buffer overflow

Sorry
-

you had a wrong answer, please review details below.

The Intel x86 processors u
se the hexadecimal number 90 to represent NOP (no operation). Most of
the buffer overflow exploits designed since
11/8/1996

use a long string of NOPs to write past the

base pointer and down into the stack to overwrite a return code.
newer buffer overflows

may not
have this char
acteristic.

Source: The
LISA documentation

for snort describes these packets.

5.

Which of the following OSI layers provides non
-
repudiation services?

Answer:

application

Sorry
-

you ha
d a wrong answer, please review details below.

Layer 7 of the OSI model allows applications (users) to use the network in a distributed processing
environment. Non
-
repudiation is a user (application) function. Therefore, non
-
repudiation is
considered to b
e at the application layer of the OSI model, level 7.

Source:
The OSI Reference Model
.

Thanks to Peter Mosmans for providing a reference for this question.

6.

Both TCP and UDP us
e port numbers of what length?

Answer:

16 bits

Sorry
-

you had a wrong answer, please review details below.

The port numbers range from 1 to 65535.

Source: STEVENS, Richard W.,
TCP/IP Illustrated, Volume 1: The Protocols
, 1994, Addison
-
Wesley Pub Co., pg. 10.

7.

The IP header contains a protocol field. If this field contains the value of 2, what type of data is
contained within the IP datagram?

Answer:

IGMP

So
rry
-

you had a wrong answer, please review details below.

TCP=6, ICMP=1, UDP=17, IGMP=2

Source: STEVENS, Richard W.,
TCP/IP Illustrated, Volume 1: The Protocol
s
, 1994, Addison
-
Wesley Pub Co., pg. 10.

8.

The IP header contains a protocol field. If this field contains the value of 6, what type of data is
contained within the ip datagram?

Answer:

TCP

Sorry
-

you had a wrong answer, please review details below.

TC
P=6, ICMP=1, UDP=17, IGMP=2

Source: STEVENS, Richard W.,
TCP/IP Illustrated, Volume 1: The Protocols
, 1994, Addison
-
Wesley Pub Co., pg. 10.

9.

Fast Ethernet opera
tes at which of the following?

Answer:

100 MBps

Sorry
-

you had a wrong answer, please review details below.

Fast Ethernet operates at 100 MBps.

Source: KRUTZ, Ronald L. & VINES, Russel D.,
The CISSP Prep Guide: Mastering the Ten
Domains of Computer Security
, page 108.

Thanks to George Wood for providing this question.

10.

Which of the following is an ipaddress that is private (i.e. reserved for internal network
s, and not a
valid address to use on the Internet)?

Answer:

192.168.42.5

Sorry
-

you had a wrong answer, please review details below.

Each class of addresses contains a block that are reserved for private networks and which are not
routable across the p
ublic Internet. For class A, the reserved addresses are 10.0.0.0
-

10.255.255.255. For class B networks, the reserved addresses are 172.16.0.0
-

172.31.255.255. For
class C, the reserved addresses are 192.168.0.0
-

192.168.255.255.

Source: The Linux
Net
-
HOWTO
.

Also ensure that you take a look at
RFC 1918
, which is THE reference for private address space.

11.

Telnet and rl
ogin use which protocol?

Answer:

TCP

Sorry
-

you had a wrong answer, please review details below.

Source: STEVENS, Richard W.,
TCP/IP Illustrated, Volume 1: Th
e Protocols
, 1994, Addison
-
Wesley Pub Co., pg. 25.

12.

In the OSI / ISO model, at what level are TCP and UDP provided?

Answer:

Transport

Sorry
-

you had a wrong answer, please review details below.

The
Transport

layer of the
OSI/ISO

model supports the TCP and UDP protocol.

13.

The connection using
fiber optics from the phone company's branch office to local customers is
which of the following?

Answer:

local loop

Sorry
-

you had a wrong answer, please review details below.

Transmission on fiber optic wire requires repeating at distance intervals.
The glass fiber requires
more protection within an outer cable than copper. For these reasons and because the installation
of any new wiring is labor
-
intensive, few communities yet have fiber optic wires or cables from
the phone company's branch office to
local customers (local loop).

Source: STEINER, Kurt,
Telecommunications and Network Security, Version 1, May 2002
,
CISSP Open Study Group (Domain Leader: skottikus), Page 14. Available at
www.cccure.org
.

Thanks to Rakesh Sud for providing this question.

14.

A packet containing a long string of NOP's followed by a command is usually indicative of what?

Answer:

A buffer overflow

Sorry
-

you had a wrong answer, please review details below.

Most of the buffer
overflow exploits designed since
11/8/1996

use a long string of NOPs to write
past the base pointer and down into the stack to overwrite a return code.
newer buffer overflows

may not have this characteristic.

Source: The
LISA documentation

for snort describes these packets.

15.

Which of the following is an ipaddress that is private (i.e. reserved for internal networks, and not a
valid address to use on the Internet)?

Answer:

10.0.42.5

Sorry
-

you had a wrong
answer, please review details below.

Each class of addresses contains a block that are reserved for private networks and which are not
routable across the public Internet. For class A, the reserved addresses are 10.0.0.0
-

10.255.255.255. For class B netw
orks, the reserved addresses are 172.16.0.0
-

172.31.255.255. For
class C, the reserved addresses are 192.168.0.0
-

192.168.255.255.

Source: The Linux
Net
-
HOWTO
.

Also ensure that yo
u take a look at
RFC 1918
, which is THE reference for private address space.

16.

Which of the following statements about the "Intranet" is NOT true?

Answer:

It is unrestricted and publicly ava
ilable.

Sorry
-

you had a wrong answer, please review details below.

Details and reference for this question are not yet available. This question is a new question that
was submitted by one of the member of the site and I have to find a reference for it.

If you do have
a reference to this question, please send it to Christian at cvezina@noos.fr with the question
above. Thanks. Clement.

17.

Which of the following OSI layers provides routing and related services?

Answer:

Network

Sorry
-

you had a wrong answe
r, please review details below.

The network layer provides routing and related functions that enable multiple data links to be
combined into an Internetwork.

Reference: HARRIS, Shon,
All
-
In
-
One CISSP Certification Exam Guide
, McGraw
-
Hill/Osborne,
2002, chapter 7: Telecommunications and Network Security (page 351).

Thanks to Christian Vezina for providing a reference for this question.

18.

What is the proper term t
o refer to a single unit of IP data?

Answer:

IP datagram

Sorry
-

you had a wrong answer, please review details below.

The proper terms are TCP segment, IP datagram, and Ethernet frame.

Source: STEVENS, Richard W.,
TCP/IP Illustrated, Volume 1: The Protocols
, 1994, Addison
-
Wesley Pub Co., pg. 10.

19.

ICMP and IGMP belong to which layer of the OSI model?

Answer:

Network

Sorry
-

you had a wrong answer, please revi
ew details below.

Although ICMP and IGMP are moved across the network within IP datagrams like TCP, do not
provide end
-
to
-
end transport so they cannot be part of the transport layer like TCP.

Source: STEVENS, Richard W.,
TCP/IP Illustrated, Volume 1: The Protocols
, 1994, Addison
-
Wesley Pub Co., pg. 2.

20.

Which of the following is true related to network sniffing?

Answer:

Sniffers allow an attacker to monitor data

passing across a network.

Sorry
-

you had a wrong answer, please review details below.

Sniffers allow an attacker to monitor data passing across a network ... Sniffers exploit
characteristics of several data
-
link technologies, including Token Ring and e
specially Ethernet. IP
Spoofing is a network
-
based attack, which involves altering the source address of a computer to
disguise the attacker and exploit weak authentication methods. Session Hijacking tools allow an
attacker to take over network connections
, kicking off the legitimate user or sharing a login.
Malformed Packer attacks are a type of DoS attack that involves one or two packets that are
formatted in an unexpected way. Many vendor product implementations do not take into account
all variations of

user entries or packet types. If software handles such errors poorly, the system
may crash when it receives such packets. A classic example of this type of attack involves sending
IP fragments to a system that overlap with each other (the fragment offset
values are incorrectly
set. Some unpatched Windows and Linux systems will crash when the encounter such packets.

Source: TIPTON, Harold F. & KRAUSE, MICKI,
Infor
mation Security Management Handbook,
4th Edition, Volume 2
, Auerbach, NY, NY 2001, Chapter 22, Hacker Tools and Techniques by Ed
Skoudis.

21.

Which of the following provide network redundancy in a local network environment?

Answer:

Dual backbones

Sorry
-

y
ou had a wrong answer, please review details below.

Growth in data traffic, coupled with the requirement to utilize bandwidth more efficiently, has in
many cases resulted in organizations setting up dedicated data networks. In the meantime, the
TDM backbo
ne remained in place to service voice requirements. The result is dual backbones
-

one for voice, the other for data.

Thanks to Rakesh Sud for providing details to this question.

22.

How do you distinguish between a bridge and a router?

Answer:

The bridge c
onnects two networks at the link layer, while router connects two networks
at the network layer.

Sorry
-

you had a wrong answer, please review details below.

Source: STEVENS, Richard W.,
TCP/IP Illustrated, Volume 1: The Protocols
, 1994, Addison
-
Wesley Pub Co., pg. 6.

23.

The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers are in
which of the following order (1 to 7) ?

Answer:

Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer,
Presentation Layer, Application Layer

Sorry
-

you had a wrong answer, please review details below.

International Standards Organization / Open Systems Interconnection (ISO/OS
I) Layers and
Characteristics:

Physical Layer

Data Link Layer

Network Layer

Transport Layer

Session Layer

Presentation Layer

Applications Layer

Mnemonics: Please Do Not Throw Sausage Pizza Away (bottom to top layer)

All People Seem To Need Data Processin
g (top to bottom layer).

Source: STEINER, Kurt,
Telecommunications and Network Security, Version 1, May 2002
,
CISSP Open Study Group (Domain Leader: skottikus), Page 10. Available at
www.cccure.org
.

Thank
s to Rakesh Sud for providing this question and to Arlen Fletcher for reviewing it.

24.

The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers does
NOT have which of the following characteristics?

Answer:

Used to gain inform
ation from network devices such as count of packets received and
routing tables

Sorry
-

you had a wrong answer, please review details below.

The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers and
Characteristics Stan
dard model for network communications allows dissimilar networks to
communicate, Defines 7 protocol layers (a.k.a. protocol stack) Each layer on one workstation
communicates with its respective layer on another workstation using protocols (i.e. agreed
-
upon

communication formats) "Mapping" each protocol to the model is useful for comparing protocols.

Mnemonics: Please Do Not Throw Sausage Pizza Away (bottom to top layer)

All People Seem To Need Data Processing (top to bottom layer).

Source: STEINER, Kurt,
T
elecommunications and Network Security, Version 1, May 2002
,
CISSP Open Study Group (Domain Leader: skottikus), Page 12. Available at
www.cccure.org
.

Thanks to Rakesh Sud for providing this question.

25.

ARP
and RARP map between which of the following?

Answer:

32
-
bit addresses in IPv4 and 48
-
bit hardware addresses

Sorry
-

you had a wrong answer, please review details below.

Source: STEVENS, Richard W.,
TCP/IP Illustrated, Volume 1: The Protocols
, 1994, Addison
-
Wesley Pub Co., pg. 22.

26.

Which of the following layers provides end
-
to
-
end service?

Answer:

Transport Layer

Sorry
-

you had a wrong answer, please review d
etails below.

Both TCP and UDP are transport layer protocols

Source: STEVENS, Richard W.,
TCP/IP Illustrated, Volume 1: The Protocols
, 1994, Addison
-
Wesley Pub

Co., pg. 19.

27.

In the days before CIDR (Classless Internet Domain Routing), networks were commonly
organized by classes. Which of the following would have been true of a Class B network?

Answer:

The first bit of the ipaddress would be set to one and the s
econd bit set to zero.

Sorry
-

you had a wrong answer, please review details below.

Source: SEMERIA, Chuck,
Understanding IP Addressing: Everything You Ever Wanted
To
Know
, 3Com Corporation.

28.

Which of the following access methods is used by Ethernet?

Answer:

CSMA/CD

Sorry
-

you had a wrong answer, please review details below.

CSMA/CD is an acronym for "Carrier Sense, Multiple Access with Collision Detection".

So
urce: STEVENS, Richard W.,
TCP/IP Illustrated, Volume 1: The Protocols
, 1994, Addison
-
Wesley Pub Co., pg. 21.

29.

What is the proper term to refer to a single unit
of TCP data at the transport layer?

Answer:

TCP segment

Sorry
-

you had a wrong answer, please review details below.

The proper terms is TCP segment.

Source: STEVENS, Richard W.,
TCP/IP Illustrated, Volume 1: The Protocols
, 1994, Addison
-
Wesley Pub Co., pg. 10.

30.

In the days before CIDR (Classless Internet Domain Routing), networks were commonly
organized by classes. Which of the following would have been true
of a Class C network?

Answer:

The first two bits of the ip address would be set to one, and the third bit set to zero.

Sorry
-

you had a wrong answer, please review details below.

Each class of addresses contains a block that are reserved for private ne
tworks and which are not
routable across the public Internet. For class A, the reserved addresses are 10.0.0.0
-

10.255.255.255. For class B networks, the reserved addresses are 172.16.0.0
-

172.31.255.255. For
class C, the reserved addresses are 192.168.0
.0
-

192.168.255.255.

Source: SEMERIA, Chuck,
Understanding IP Addressing: Everything You Ever Wanted To
Know
, 3Com Corporation.

31.

What is the proper term to refer t
o a single unit of Ethernet data?

Answer:

Ethernet frame

Sorry
-

you had a wrong answer, please review details below.

The proper terms is Ethernet frame.

Source: STEVENS, Richard W.,
TCP/IP Illustrated, Volume 1: The Protocols
, 1994, Addison
-
Wesley Pub Co., pg. 10.

32.

Which of the following is an ipaddress that is private (i.e. reserved for internal networks, and not a
valid address to use on the Internet)?

Ans
wer:

172.31.42.5

Sorry
-

you had a wrong answer, please review details below.

Each class of addresses contains a block that are reserved for private networks and which are not
routable across the public Internet. For class A, the reserved addresses are 1
0.0.0.0
-

10.255.255.255. For class B networks, the reserved addresses are 172.16.0.0
-

172.31.255.255. For
class C, the reserved addresses are 192.168.0.0
-

192.168.255.255.

Source: The Linux
Net
-
HOWTO
.

Also ensure that you take a look at
RFC 1918
, which is THE reference for private address space.

33.

In The OSI / ISO model, at what layer are some of the SLIP, CSLIP, PPP

control functions are
provided?

Answer:

Link

Sorry
-

you had a wrong answer, please review details below.

The
Data Link

layer o
f the
OSI/ISO

model provides SLIP, CSLIP and PPP protocol.

RFC 1661
-

The Point
-
to
-
Point Protocol (PPP)

specifies that the Point
-
to
-
Point Protocol (PPP)
provides a standard method for transporting multi
-
protocol datagrams over point
-
to
-
point links.
PPP is comprised of three main components:

1 A method for encapsulating multi
-
protocol datagrams.

2 A Link Co
ntrol Protocol (LCP) for establishing, configuring, and testing the data
-
link
connection.

3 A family of Network Control Protocols (NCPs) for establishing and configuring different
network
-
layer protocols.

34.

Which of the following is TRUE?

Answer:

TCP is c
onnection
-
oriented. UDP is not.

Sorry
-

you had a wrong answer, please review details below.

TCP is a connection
-
oriented transport for guaranteed delivery of data.

UDP does
not

provide for error correction

UDP is useful for shorter messages


Reference
:
Understanding the Difference between TCP/IP and IPX/SPX
.

James's TCP
-
IP FAQ
-

Understanding Port Numb
ers
.

35.

The IP header contains a protocol field. If this field contains the value of 1, what type of data is
contained within the IP datagram?

Answer:

ICMP

Sorry
-

you had a wrong answer, please review details below.

TCP=6, ICMP=1, UDP=17, IGMP=2

Source
: STEVENS, Richard W.,
TCP/IP Illustrated, Volume 1: The Protocols
, 1994, Addison
-
Wesley Pub Co., pg. 10.

36.

The IP header contains a protocol field. If this field

contains the value of 17, what type of data is
contained within the ip datagram?

Answer:

UDP

Sorry
-

you had a wrong answer, please review details below.

TCP=6, ICMP=1, UDP=17, IGMP=2

Source: STEVENS, Richard W.,
TCP/IP Illustrated, Volume 1: The Protocols
, 1994, Addison
-
Wesley Pub Co., pg. 10.

37.

Frame relay and X.25 networks are part of which of the following?

Answer:

Packet
-
switched services

Sorry
-

you ha
d a wrong answer, please review details below.

Reference: HARRIS, Shon,
All
-
In
-
One CISSP Certification Exam Guide
, McGraw
-
Hill/Osborne,
2002, chapter 7: Telecom
munications and Network Security (pages 451
-
461).

Thanks to Don Murdoch for providing a reference to this question.

38.

Which of the following is an ipaddress that is private (i.e. reserved for internal networks, and not a
valid address to use on the Interne
t)?

Answer:

172.16.42.5

Sorry
-

you had a wrong answer, please review details below.

Each class of addresses contains a block that are reserved for private networks and which are not
routable across the public Internet. For class A, the reserved address
es are 10.0.0.0
-

10.255.255.255. For class B networks, the reserved addresses are 172.16.0.0
-

172.31.255.255. For
class C, the reserved addresses are 192.168.0.0
-

192.168.255.255.

Source: The Linux
Net
-
HOWTO
.

Also ensure that you take a look at
RFC 1918
, which is THE reference for private address space.

You scored 0 out of 38 (0 %).




Thanks! for using the CISSP
OSG test facility

Submit your own questions to improve the test!

Questions and comments can be sent to: cvezina@noos.fr