telecommunicationsWord格式.docx

上传人:b****6 文档编号:17909465 上传时间:2022-12-12 格式:DOCX 页数:14 大小:21.48KB
下载 相关 举报
telecommunicationsWord格式.docx_第1页
第1页 / 共14页
telecommunicationsWord格式.docx_第2页
第2页 / 共14页
telecommunicationsWord格式.docx_第3页
第3页 / 共14页
telecommunicationsWord格式.docx_第4页
第4页 / 共14页
telecommunicationsWord格式.docx_第5页
第5页 / 共14页
点击查看更多>>
下载资源
资源描述

telecommunicationsWord格式.docx

《telecommunicationsWord格式.docx》由会员分享,可在线阅读,更多相关《telecommunicationsWord格式.docx(14页珍藏版)》请在冰豆网上搜索。

telecommunicationsWord格式.docx

c.Theservicesverifyfaxcontent.

d.Faxtransmissionsareusuallyblockedbyafirewall.

a

3.Whichoneofthefollowingcanbeusedtoverifythesourceofafaxtransmission?

a.CallerID

b.RingDifferentialDetector

c.IDbannerstampedoncoverpage

d.Callforwarding

Reference:

BellcoreCNDTR_-TSY0000302230

BritishTelcomCIDStandardSIN227

EVETSI300

Note:

NewacronymCND=CallingNumberDelivery

Discussion:

Answera-correct-accuratereportofcallingnumber.

Answerb-wrong-thisisasignalingfunction.

Answerc-wrong-thiscanbeforged.

Answerd-wrong-doesn’tprovidesource.

4.Whyarelocalareanetworksmorevulnerabletodatacompromisethanmainframecomputers?

a.Transmissioncapacity

b.Storagecapacity

c.Multiplepointsofaccess

d.Removablemedia

c.

5.Howshouldaccesstoalocalareanetworkbecontrolledforoutsidesupport?

a.Obtainthesignatureoftheuser.

b.Issueatemporarypassword.

c.Verifyuseremployment.

d.Requestuseridentification.

b.

SecurityData&

VoiceCommunications;

Simonds;

McGraw-Hill;

1996;

pg104.

Outsidesupportreferstoremoteaccessfromavendor’ssiteforsystemmaintenance,etc.Therefore,a.&

d.wouldn’tbepracticalunlessdigitalsignatures(certificates)areused.Thismaybeanoptioninthefuture,butnow,b.isthebest.Thethirdanswer,c.,isobviouslyincorrectbecausethequestionisaddressinganon-employeesituation.

6.Whydoesfiberopticcommunicationtechnologyhavesignificantsecurityadvantageoverothertransmissiontechnology?

a.Higherdataratescanbetransmitted.

b.Interceptionofdatatrafficismoredifficult.

c.Trafficanalysisispreventedbymultiplexing.

d.Singleanddouble-biterrorsarecorrectable.

b.

Voice&

DataCommunicationsHandbook;

pg631.

Answera-wrong-higherdataratesarenotasecurityadvantage.

Answerb-correct-fiberisresistanttotapping.

Answerc-wrong-multiplexingisnotalwaysusedwithfiber.

Answerd-wrong-errorcorrectingisnotassociatedwithatransmissionmedium,butwithaprotocol.

7.WhichofthefollowingtelecommunicationsmediaisMOSTresistanttotapping?

a.Twistedpair

b.Coaxial

c.Shieldedcoaxial

d.Fiberoptic

d.

DatacomHandbook;

JRanade;

McGraw=Hill;

1998;

pg878.

Answera-wrong-twistedpaircanbetappedusinginductiveordirectattackconnections.

Answerb-coaxialismoredifficulttotap,butthecablecanbeintrudedwithoutchangingtransmissioncharacteristics.

Answerc-wrong-shieldedcoaxialismoredifficulttotap,butcablecanbeintrudedwithoutchangingtransmissioncharacteristics.

Answerd-correct-fiberopticcan’tbetappedbyinductionorintrusionwithoutalteringtransmissioncharacteristics.

8.Whatisabasicsecurityproblemindistributedsystems?

a.Knowingwhototrust.

b.Knowingwhentoreconnect.

c.Knowinghowtonameresources.

d.Knowingtheorderoftransactions.

a.

SecureComputing;

RitaSurrons;

1997;

pg535-536.

Discussion:

Answera-correct

Answerb-wrong-reconnectwhat?

Indiscriminate.

Answerc-wrong-namingofresourcesmayfacilitatesecurityimplementationbutwouldalsoapplytomainframePIDs&

LIDs.

Answerd-wrong-wouldapplytobothLAN&

Mainframe.

9.Whichnetworktopologypassesalltrafficthroughallactivenodes?

a.Broadband

b.HubandSpoke

c.Baseband

d.TokenRing

d.

DataCommHandbook;

JRanada;

pg541.

Broadband-adata-transmissiontechniquethatallowsmultiplesignalstosharethebandwidthofatransmissionmedia.CableTVisabroadbandtransmissioninthatsignalsformultipleTVstationsarecarriedoverseparatechannels.

Hub&

Spoke-astartopologywhereallsignalsgothroughthehubbutnottoallnodes.

Baseband-adata-transmissiontechniquethatusestheentirebandwidthofamedia,withoutmodulatingadigitalsignal.Ethernet,TokenRing,&

Arcnetusebasebandtransmission.

TokenRing-anetworkarchitecturethatpassesanelectroniccharactercalledatokenamongnodesconnectedinacircular,closed-loopcablingsystem.

10.Layer4oftheOSIstackisknownas

a.thedatalinklayer

b.thetransportlayer

c.thenetworklayer

d.thepresentationlayer

pg335.

Thedatalinklayerislayer2.

Thetransportlayerislayer4.

Thenetworklayerislayer3.

Thepresentationlayerislayer6.

11.AnothernameforaVPNisa

a.tunnel

b.one-timepassword

c.pipeline

d.bypass

Answera-correct-bydefinition,aVPNprovidesasecuretunnelfromonesitetoanotheroveraninsecureenvironmentsuchastheInternet.

Answerb-wrong-hasnothingtodowithvirtualnetworking.

Answerc-wrong-named-pipeisUNIXinternalmessagingprotocol.

Answerd-wrong-streamisUNIXinternalmessagingprotocol.

12.Whichofthefollowingprotocolsiscommonlyusedtoverifydial-upconnectionsbetweenhosts?

a.Unix-to-UnixCommunicationProtocol(UUCP)

b.ChallengeHandshakeAuthenticationProtocol(CHAP)

c.Point-to-PointTunnelingProtocol(PPTP)

d.SimpleKeymanagementforInternetProtocol(SKIP)

Simmons,Fred;

NetworkSecurity-DataandVoiceCommunications;

pg157.

SecureComputing;

RitaSummers;

McGraw-_Hill;

pg529.

UUCP-anapplicationthatallowsoneUnixtimesharingsystemtocopyfilestoorfromanotherUnixtimesharingsystemoverasingleconnection.UUCPprovidesthebasisformanyUnix-basedelectronicmailapplications.

CHAP-usesstrongauthenticationtoprovideautomatedidentification&

authenticationofaremoteentity.

PPTP-createstunnelsfortransportingmultiprotocoltrafficovertheInternet.

SKIP-enablesaTCP/IPhosttosendanencryptedIPpackettoanotherhostwithoutrequiringapriormessageexchangetosetupasecurechannel.

 

13.Whichmethodisoftenusedtoreducetherisktoalocalareanetworkthathasexternalconnections?

a.Passwords

b.Firewall

c.Dial-up

d.Fiberoptics

InternetSecurity;

ProfessionalReference;

NewRiders;

Varnors;

pg197.

Answera-wrong-passwordsareusedforauthentication.

Answerb-correct-firewallsprovidearesistancetoattacksfromtheoutside-noneoftheothersdo.

Answerc-wrong-dial-updoesnotprovideprotection,onlyprovidesremoteaccessthatcanbespoofed.

Answerd-wrong-fiberopticsisatransportmechanism&

doesn’tprovideprotection.

14.WhichoneofthefollowingTCP/IPprotocolsusesa“connected”session?

a.TCP

b.ICMP

c.UDP

d.IP

a.

Simmons,Fred,NetworkSecurity-DataandVoiceCommunications,1996,McGrawHill,pg218-219andSocolofskiandKale,IETFRFC1180,January1991,pg24)

TCP-TransmissionControlProtocol

ICMP-InternetControlMessageProtocol

UDP-UserDatagramProtocol

IP-InternetProtocol

15.IPSEC(IPSecurity),S-HTTP(Secure-HTTP)andSSL(SecureSocketLayer)areexamplesof

a.SecureMulti-purposeInternetMailExtensions(S/MIME).

b.SecureInternetprotocols.

c.Intranettransactionprotocols.

d.Applicationprotocolinterfaces.

HISM‘99;

Krause/Tipton;

Auerbach;

pg387.

Answera-wrong-S/MIMEisalsoasecureInternetprotocol.

Answerb-correct-allareusedontheInternettosecuretransmissions.

Answerc-wrong-IPSECisnottransactionrelated;

itwillworkwithbothconnection&

connectionless.

Answerd-wrong-interfaces(i.e.,API)aretheconnectionpointsintoaprotocol.Theitemsmentionedarefullprotocols.

16.WhichofthefollowingisthePRIMARYobjectiveofafirewall?

a.Protectonenetworkfromanother.

b.PreventIPtrafficfromgoingoutofthenetwork.

c.BlockSNAtraffic.

d.Monitornetworktraffic.

HISM99;

pg96-103.

Answera-correct.

Answerb-wrong-afirewallmaypreventsomeIPtrafficbutifitpreventedalltraffic,itwouldservethesamepurposeasdisconnecting.

Answerc-wrong-SNAtrafficistospecifictobetheprimarypurpose.

Answerd-wrong-thisisasecondaryresultofprocessingdatafortheprotectednetwork.

17.WhichofthefollowingproxiesdoesNOTexamineservicecommands(e.g.F

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 工程科技 > 冶金矿山地质

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1