Page 1538 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1538
Chapter 11: Secure Network Architecture and
Securing Network Components
1. D. The Transport layer is layer 4. The Presentation layer is layer 6,
the Data Link layer is layer 2, and the Network layer is layer 3.
2. B. Encapsulation is adding a header and footer to data as it moves
down the OSI stack.
3. B. Layer 5, Session, manages simplex (one-direction), half-duplex
(two-way, but only one direction can send data at a time), and full-
duplex (two-way, in which data can be sent in both directions
simultaneously) communications.
4. B. UTP is the least resistant to EMI because it is unshielded.
Thinnet (10Base2) is a type of coaxial cable that is shielded against
EMI. STP is a shielded form of twisted pair that resists EMI. Fiber
is not affected by terrestrial EMI.
5. D. A VPN is a secure tunnel used to establish connections across a
potentially insecure intermediary network. Intranet, extranet, and
DMZ are examples of network segmentation.
6. B. Radio-frequency identification (RFID) is a tracking technology
based on the ability to power a radio transmitter using current
generated in an antenna when placed in a magnetic field. RFID can
be triggered/powered and read from a considerable distance away
(often hundreds of meters).
7. C. A bluejacking attack is a wireless attack on Bluetooth, and the
most common device compromised in a bluejacking attack is a cell
phone.
8. A. Ethernet is based on the IEEE 802.3 standard.
9. B. A TCP wrapper is an application that can serve as a basic firewall
by restricting access based on user IDs or system IDs.
10. B. Encapsulation is both a benefit and a potentially harmful

