Questions for Domain 4: Communication & Network Security

  1. Restricting Bluetooth device discovery relies on the secrecy of what?
    (a) MAC address
    (b) Symmetric key
    (c) Private key
    (d) Public key
  2. What are the names of the OSI model layers in order from bottom to top?
    (a) Physical, Data Link, Transport, Network, Session, Presentation, Application
    (b) Physical, Network, Data Link, Transport, Session, Presentation, Application
    (c) Physical, Data Link, Network, Transport, Session, Presentation, Application
    (d) Physical, Data Link, Network, Transport, Presentation, Session, Application
  3. What is the most secure type of EAP?
    (a) EAP-TLS
    (b) EAP-TTLS
    (c) LEAP
    (d) PEAP
  4. What is the most secure type of firewall?
    (a) Packet filter
    (b) Stateful firewall
    (c) Circuit-level proxy firewall
    (d) Application-layer proxy firewall
  5. Accessing an IPv6 network via an IPv4 network is called what?
    (a) CIDR
    (b) NAT
    (c) Translation
    (d) Tunnelling

Answers in comments

One thought on “Questions for Domain 4: Communication & Network Security

  1. Q1: (a) MAC address

    Q2: (c) Physical, Data Link, Network, Transport, Session, Presentation, Application (“Please Do Not Throw Sausage Pizza Away”)

    Q3: (a) EAP-TLS (it requires both server-side & client-side certificates)

    Q4: (d) Application-layer proxy firewall (the most secure because it has the ability to filter based on Layers 3-7)

    Q5: (d) Tunnelling (translation is a distractor answer)

    Like

Leave a comment

Design a site like this with WordPress.com
Get started