CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 4: Communication and Network Security (Domain 4) 357


because they may have to be passed without any inspection. Christmas tree attacks set all
of the possible flags on a TCP packet (and are thus related to an IP protocol), IPX is not
an IP-based protocol, and while these protocols are outdated, there are ways to make even
modern PCs understand them.


  1. C. Of the three answers, PEAP is the best solution. It encapsulates EAP in a TLS tunnel,
    providing strong encryption. LEAP is a Cisco proprietary protocol that was originally
    designed to help deal with problems in WEP. LEAP’s protections have been defeated,
    making it a poor choice.

  2. A. L2TP can use IPsec to provide encryption of traffic, ensuring confidentiality of the
    traffic carried via an L2TP VPN. PPTP sends the initial packets of a session in plaintext,
    potentially including usernames and hashed passwords. PPTP does support EAP and was
    designed to encapsulate PPP packets. All VPNs are point to point, and multipoint issues
    are not a VPN problem.

  3. C. A full mesh topology directly connects each machine to every other machine on the
    network. For five systems, this means four connections per system.

  4. D. Ethernet uses a bus topology. While devices may be physically connected to a switch in
    a physical topology that looks like a star, systems using Ethernet can all transmit on the
    bus simultaneously, possibly leading to collisions.

  5. D. ARP spoofing is often done to replace a target’s cache entry for a destination IP,
    allowing the attacker to conduct a man-in-the-middle attack. A denial of service attack
    would be aimed at disrupting services rather than spoofing an ARP response, a replay
    attack will involve existing sessions, and a Trojan is malware that is disguised in a way
    that makes it look harmless.

  6. B. Category 3 UTP cable is primarily used for phone cables and was also used for early
    Ethernet networks where it provided 10 Mbps of throughput. Cat 5 cable provides 100
    Mbps (and 1000 Mbps if it is Cat 5e). Cat 6 cable can also provide 1000 Mbps.

  7. B. Crosstalk occurs when data transmitted on one set of wires is picked up on another
    set of wires. Interference like this is electromagnetic rather than simply magnetic,
    transmission absorption is a made-up term, and amplitude modulation is how AM radio
    works.

  8. B. WEP’s implementation of RC4 is weakened by its use of a static common key and a
    limited number of initialization vectors. It does not use asymmetric encryption, and clients
    do not select encryption algorithms.

  9. B. VLANs can be used to logically separate groups of network ports while still providing
    access to an uplink. Per-room VPNs would create significant overhead for support as well
    as create additional expenses. Port security is used to limit what systems can connect to
    ports, but it doesn’t provide network security between systems. Finally, while firewalls
    might work, they would add additional expense and complexity without adding any
    benefits over a VLAN solution.

Free download pdf