181. Most hardware/software guard implementations use which of the following approaches?
a.
Private networkb.
Dual networkc.
Public networkd.
Backbone networkHardware and/or software guards enable users to exchange data between private and public networks, which is normally prohibited because of information confidentiality. A combination of hardware and/or software guards is used to allow secure local-area network (LAN) connectivity between enclave boundaries operating at different security classification levels (i.e., one private and the other public).
182. For active attacks on hardware/software guards, which of the following are countermeasures against manipulation of data on the private network?
1.
Encryption algorithms2.
Key management processes3.
Cryptographic authentication4.
Data-separation methodsa.
1 and 2b.
1 and 3c.
3 and 4d.
1, 2, 3, and 4183. Which of the following is
a.
Session hijackingb.
Invalidated inputc.
Ping of deathd.
SYN flood184. For active attacks on hardware/software guards, which of the following are countermeasures against modification of data in transit?
1.
Timestamps2.
Sequence numbers3.
Digital signatures4.
Keyed hash integrity checksa.
1 and 2b.
1 and 3c.
3 and 4d.
1, 2, 3, and 4185. Most attacks are targeted at which of the following Transmission Control Protocol/Internet Protocol (TCP/IP) layers?
a.
Application layerb.
Transport layerc.
Network layerd.
Data link layerHypertext transfer protocol (HTTP) is a function of the application layer, along with DNS, SMTP, FTP, and SNMP. This layer sends and receives data for particular applications. The transport layer provides connection-oriented or connectionless services for transporting application layer services between networks. The network layer routes packets across networks. The data link layer handles communications on the physical network components.
186. Which of the following statements about media access control/medium access control (MAC) address are true?
1.
Each frame contains two MAC addresses.2.
Each frame contains either IP or ARP.