Page 1538 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1538

Chapter 11: Secure Network Architecture and

               Securing Network Components




                1.  D. The Transport layer is layer 4. The Presentation layer is layer 6,
                    the Data Link layer is layer 2, and the Network layer is layer 3.


                2.  B. Encapsulation is adding a header and footer to data as it moves
                    down the OSI stack.

                3.  B. Layer 5, Session, manages simplex (one-direction), half-duplex
                    (two-way, but only one direction can send data at a time), and full-
                    duplex (two-way, in which data can be sent in both directions
                    simultaneously) communications.

                4.  B. UTP is the least resistant to EMI because it is unshielded.
                    Thinnet (10Base2) is a type of coaxial cable that is shielded against

                    EMI. STP is a shielded form of twisted pair that resists EMI. Fiber
                    is not affected by terrestrial EMI.

                5.  D. A VPN is a secure tunnel used to establish connections across a
                    potentially insecure intermediary network. Intranet, extranet, and
                    DMZ are examples of network segmentation.

                6.  B. Radio-frequency identification (RFID) is a tracking technology

                    based on the ability to power a radio transmitter using current
                    generated in an antenna when placed in a magnetic field. RFID can
                    be triggered/powered and read from a considerable distance away
                    (often hundreds of meters).

                7.  C. A bluejacking attack is a wireless attack on Bluetooth, and the
                    most common device compromised in a bluejacking attack is a cell
                    phone.

                8.  A. Ethernet is based on the IEEE 802.3 standard.


                9.  B. A TCP wrapper is an application that can serve as a basic firewall
                    by restricting access based on user IDs or system IDs.

              10.  B. Encapsulation is both a benefit and a potentially harmful
   1533   1534   1535   1536   1537   1538   1539   1540   1541   1542   1543