You are on page 1of 3

1. Match the OSI Layers 1 - 7 to the names for those layers. A. Session B. Presentation C. Transport D. Data Link E.

Application F. Network G. Physical Feedback: See pages 261 and 262. Correct Answer(s): Network :Layer 3 , Data Link :Layer 2 , Transport :Layer 4 , Physical :Layer 1 , Presentation :Layer 6 , Session :Layer 5 , Application :Layer 7 2. Which of the following protocols is used by the Internet? A) DECnet B) MAP C) IPX/SPX D) TCP/IP E) SNA Feedback: See page 268. Correct Answer(s): D 3. Intrusion detection has which of the following sets of characteristics? A) It is disruptive rather than preventative. B) It is administrative rather than preventative. C) It is adaptive rather than preventative. D) It is detective rather than preventative. Feedback: See page 280. Correct Answer(s): D 4. The telecommunications, network, and internet security domain of security is als o concerned with the prevention o and detection of misuse or abuse of systems, w hich poses a threat to the tenets of A) confidentiality, integrity, and availability (CIA). B) confidentiality, integrity, and entity (CIE). C) confidentiality, integrity, and authenticity (CIA). D) confidentiality, integrity, and liability (CIL). Feedback: Based on the material covered in the course to this date. Correct Answer(s): A 5. The OSI layer 6 is which of the following layers? A) Data Link B) Network C) Presentation D) Physical E) Application

Feedback: See Web references. Correct Answer(s): C 6. The physical layer is the OSI Layer 7. A) True B) False Feedback: See the Web references. Correct Answer(s): False 7. What advantages does a VPN offer? A) allows employees and business partners access to the organization's network i n a secure fashion B) All of the above. C) reduced cost of dedicated network services D) generally more secure than shared network services Feedback: See page 283. Correct Answer(s): B 8. IPSEC A) existed prior to the start of the Internet. B) provides redundant security for IP-based networks. C) performs encryption and authentication. D) is an acronym for the Internal Policy on Security Enforcement Committee. Feedback: See pages 283 and 284. Correct Answer(s): C 9. Which of the following is most affected by Denial -of -Service attacks? A) integrity B) accountability C) confidentiality D) availability Feedback: Based on all the course material covered. Correct Answer(s): D 10. A firewall is A) a network segment off the firewall in which you would put systems that requir e different levels of access than other network components. B) a mail relay. C) a pass-through device (hardware or software device) that allows only certain traffic in or out. D) an external DNS server. Feedback: See page 272. Correct Answer(s): C

11. Which of the following is the simplest type of firewall? A) packet-filtering firewall B) stateful packet-filtering firewall C) dual-homed host firewall D) application gateway Feedback: See pages 269 and 271. Correct Answer(s): A 12. Which OSI layer uses the physical address? A) Application B) Data Link C) Session D) Network E) Transport Feedback: See Web references. Correct Answer(s): B 13. Which protocol in the TCP/IP suite of protocols implements reliable data transpo rt? A) Transmission Control Protocol B) Internet Control Message Protocol C) Internet protocol D) User Data Protocol Feedback: See page 263. Correct Answer(s): A 14. What is an extranet? A) None of the above. B) an intranet providing extra services C) an intranet that allows specific users outside the network to access its serv ices D) an intranet on steriods Feedback: See page 268. Correct Answer(s): C 15. A DMZ is usually placed just behind your first Internet firewall. A) True B) False Feedback: See page 278. Correct Answer(s): True

You might also like