88 Chapter 4 ■ Communication and Network Security (Domain 4)
- Which of the following drawbacks is a concern when multilayer protocols are allowed?
A. A range of protocols may be used at higher layers.
B. Covert channels are allowed.
C. Filters cannot be bypassed.
D. Encryption can’t be incorporated at multiple layers. - What network topology is shown in the following image?
A. A ring
B. A star
C. A bus
D. A mesh
- Chris uses a cellular hot spot (modem) to provide internet access when he is traveling. If
he leaves the hot spot connected to his PC while his PC is on his organization’s corporate
network, what security issue might he cause?
A. Traffic may not be routed properly, exposing sensitive data.
B. His system may act as a bridge from the internet to the local network.
C. His system may be a portal for a reflected DDoS attack.
D. Security administrators may not be able to determine his IP address if a security
issue occurs.