Skip to content

Page228

Summary of Exam Objectives

Communication and Network Security is a large and complex domain, requiring broad and sometimes deep understanding of thorny technical issues. Our modern world relies on networks, and those networks must be kept secure. It is important to not only understand why we use concepts like packet-switched networks and the OSI model, but also how we implement those concepts.

We have evolved from hubs to switches that provide traffic isolation. We have added detective devices such as HIDS and NIDS and preventive devices such as HIPS and NIPS. We have deployed secure protocols such as TLS and IPsec.

We have improved our network defense-in-depth every step of the way, and increased the confidentiality, integrity, and availability of our network data.

Self-Test

Note

Please see the Self-Test Appendix for explanations of all correct and incorrect answers.

  1. Which protocol should be used for an audio streaming server, where some loss is acceptable?
    A. IP
    B. ICMP
    C. TCP
    D. UDP

  2. What network technology uses fixed-length cells to carry data?
    A. 802.11
    B. ATM
    C. Ethernet
    D. FDDI

  3. Secure Shell (SSH) servers listen on what port and protocol?
    A. TCP port 20
    B. TCP port 21
    C. TCP port 22
    D. TCP port 23

  4. What network cable type can transmit the most data at the longest distance?
    A. Coaxial
    B. Fiber Optic
    C. Shielded Twisted Pair (STP)
    D. Unshielded Twisted Pair (UTP)

  5. Which device operates at Layer 2 of the OSI model?
    A. Hub
    B. Firewall
    C. Switch
    D. Router

  6. What are the names of the OSI model, in order from bottom to top?
    A. Physical, Data Link, Transport, Network, Session, Presentation, Application
    B. Physical, Network, Data Link, Transport, Session, Presentation, Application
    C. Physical, Data Link, Network, Transport, Session, Presentation, Application
    D. Physical, Data Link, Network, Transport, Session, Presentation, Application