90 Chapter 4 ■ Communication and Network Security (Domain 4)
- SMTP, HTTP, and SNMP all occur at what layer of the OSI model?
A. Layer 4
B. Layer 5
C. Layer 6
D. Layer 7 - Lauren uses the ping utility to check whether a remote system is up as part of a penetration
testing exercise. If she does not want to see her own ping packets, what protocol should
she filter out from her packet sniffer’s logs?
A. UDP
B. TCP
C. IP
D. ICMP - Lauren wants to provide port-based authentication on her network to ensure that clients
must authenticate before using the network. What technology is an appropriate solution
for this requirement?
A. 802.11a
B. 802.3
C. 802.15.1
D. 802.1x - Ben has deployed a 1000BaseT 1 gigabit network and needs to run a cable to another
building. If Ben is running his link directly from a switch to another switch in that
building, what is the maximum distance Ben can cover according to the 1000BaseT
specification?
A. 2 kilometers
B. 5 00 meters
C. 1 85 meters
D. 1 00 meters - Jim is building the network for a remote site that only has ISDN as an option for connec-
tivity. What type of ISDN should he look for to get the maximum speed possible?
A. BRI
B. BPRI
C. PRI
D. D channel - SPIT attacks target what technology?
A. Virtualization platforms
B. Web services