Systems Security Certified Practitioner – SSCP – Question0924

Which layer of the DoD TCP/IP Model ensures error-free delivery and packet sequencing?

A.
Internet layer
B. Network access layer
C. Host-to-host
D. Application layer

Correct Answer: C

Explanation:

This layer of the DoD Model is also sometimes called Transport in some books but the proper name is Host-to-Host as per the RFC document.
The host-to-host layer provides for reliable end-to-end communications, ensures the data’s error-free delivery, handles the data’s packet sequencing, and maintains the data’s integrity.
It is comparable to the transport layer of the OSI model.
Reference(s) used for this question: http://en.wikipedia.org/wiki/Internet_protocol_suite and http://technet.microsoft.com/en-us/library/cc786900%28v=ws.10%29.aspx and KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 85).

Systems Security Certified Practitioner – SSCP – Question0923

As per RFC 1122, which of the following is not a defined layer in the DoD TCP/IP protocol model?

A.
Application layer
B. Session layer
C. Internet layer
D. Link/Network Access Layer

Correct Answer: B

Explanation:

As per RFC, The DoD TCP/IP protocol model defines four layers, with the layers having names, not numbers, as follows:
Application (process-to-process) Layer: This is the scope within which applications create user data and communicate this data to other processes or applications on another or the same host. The communications partners are often called peers. This is where the “higher level” protocols such as SMTP, FTP, SSH, HTTP, etc. operate.
Transport (host-to-host) Layer: The Transport Layer constitutes the networking regime between two network hosts, either on the local network or on remote networks separated by routers. The Transport Layer provides a uniform networking interface that hides the actual topology (layout) of the underlying network connections. This is where flow-control, error-correction, and connection protocols exist, such as TCP. This layer deals with opening and maintaining connections between internet hosts.
Internet (internetworking) Layer: The Internet Layer has the task of exchanging datagrams across network boundaries. It is therefore also referred to as the layer that establishes internetworking; indeed, it defines and establishes the Internet. This layer defines the addressing and routing structures used for the TCP/IP protocol suite. The primary protocol in this scope is the Internet Protocol, which defines IP addresses. Its function in routing is to transport datagrams to the next IP router that has the connectivity to a network closer to the final data destination.
Link (network access) Layer: This layer defines the networking methods with the scope of the local network link on which hosts communicate without intervening routers. This layer describes the protocols used to describe the local network topology and the interfaces needed to affect transmission of Internet Layer datagrams to next-neighbor hosts.
The DoD tcp/ip model DoD model Osi Model

Graphic above from: http://bit.kuas.edu.tw/
REALITY VERSUS THE STANDARD In real life today, this is getting very confusing. Many books and references will not use exactly the same names as the initial RFC that was published. For example, the Link layer is often times called Network Access. The same applies with Transport which is often times called Host-to-Host and vice versa.
The following answer is incorrect: The session layer is defined within the OSI/ISO model but not within the DOD model. Being incorrect it made it the best answer according to the question. It does not belong to the DoD TCP/IP Model.
Reference(s) Used for this question: http://www.freesoft.org/CIE/RFC/1122/ http://bit.kuas.edu.tw/~csshieh/teach/np/tcpip/

Systems Security Certified Practitioner – SSCP – Question0922

How many layers are defined within the US Department of Defense (DoD) TCP/IP Model?

A.
7
B. 5
C. 4
D. 3

Correct Answer: C

Explanation:

The TCP/IP protocol model is similar to the OSI model but it defines only four layers:
Application Host-to-host Internet Network access
Reference(s) used for this question: http://www.novell.com/documentation/nw65/ntwk_ipv4_nw/data/hozdx4oj… and KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 84). also see: http://en.wikipedia.org/wiki/Internet_Protocol_Suite#Layer_names_an…

Systems Security Certified Practitioner – SSCP – Question0921

Which OSI/ISO layer is the Media Access Control (MAC) sublayer part of?

A.
Transport layer
B. Network layer
C. Data link layer
D. Physical layer

Correct Answer: C

Explanation:

The data link layer contains the Logical Link Control sublayer and the Media Access Control (MAC) sublayer. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 83).

Systems Security Certified Practitioner – SSCP – Question0920

Which ISO/OSI layer establishes the communications link between individual devices over a physical link or channel?

A.
Transport layer
B. Network layer
C. Data link layer
D. Physical layer

Correct Answer: C

Explanation:

The data link layer (layer 2) establishes the communications link between individual devices over a physical link or channel. It also ensures that messages are delivered to the proper device and translates the messages from layers above into bits for the physical layer (layer 1) to transmit. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 83).

Systems Security Certified Practitioner – SSCP – Question0919

Which OSI/ISO layers are TCP and UDP implemented at?

A.
Application layer
B. Presentation layer
C. Session layer
D. Transport layer

Correct Answer: D

Explanation:

TCP and UDP are implemented at the transport layer (layer 4). Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 82).

Systems Security Certified Practitioner – SSCP – Question0918

Which layer defines how packets are routed between end systems?

A.
Session layer
B. Transport layer
C. Network layer
D. Data link layer

Correct Answer: C

Explanation:

The network layer (layer 3) defines how packets are routed and relayed between end systems on the same network or on interconnected networks. Message routing, error detection and control of node traffic are managed at this level.
Reference(s) used for this question: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 82).

Systems Security Certified Practitioner – SSCP – Question0917

Which type of attack involves hijacking a session between a host and a target by predicting the target's choice of an initial TCP sequence number?

A.
IP spoofing attack
B. SYN flood attack
C. TCP sequence number attack
D. Smurf attack

Correct Answer: C

Explanation:

A TCP sequence number attack exploits the communication session which was established between the target and the trusted host that initiated the session. It involves hijacking the session between the host and the target by predicting the target’s choice of an initial TCP sequence number. An IP spoofing attack is used to convince a system that it is communication with a known entity that gives an intruder access. It involves modifying the source address of a packet for a trusted source’s address. A SYN attack is when an attacker floods a system with connection requests but does not respond when the target system replies to those requests. A smurf attack occurs when an attacker sends a spoofed (IP spoofing) PING (ICMP ECHO) packet to the broadcast address of a large network (the bounce site). The modified packet containing the address of the target system, all devices on its local network respond with a ICMP REPLY to the target system, which is then saturated with those replies. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 77).

Systems Security Certified Practitioner – SSCP – Question0916

Which type of attack involves the alteration of a packet at the IP level to convince a system that it is communicating with a known entity in order to gain access to a system?

A.
TCP sequence number attack
B. IP spoofing attack
C. Piggybacking attack
D. Teardrop attack

Correct Answer: B

Explanation:

An IP spoofing attack is used to convince a system that it is communication with a known entity that gives an intruder access. It involves modifying the source address of a packet for a trusted source’s address. A TCP sequence number attack involves hijacking a session between a host and a target by predicting the target’s choice of an initial TCP sequence number. Piggybacking refers to an attacker gaining unauthorized access to a system by using a legitimate user’s connection. A teardrop attack consists of modifying the length and fragmentation offset fields in sequential IP packets so the target system becomes confused and crashes after it receives contradictory instructions on how the fragments are offset on these packets. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 77).

Systems Security Certified Practitioner – SSCP – Question0915

What type of attack involves IP spoofing, ICMP ECHO and a bounce site?

A.
IP spoofing attack
B. Teardrop attack
C. SYN attack
D. Smurf attack

Correct Answer: D

Explanation:

A smurf attack occurs when an attacker sends a spoofed (IP spoofing) PING (ICMP ECHO) packet to the broadcast address of a large network (the bounce site). The modified packet containing the address of the target system, all devices on its local network respond with a ICMP REPLY to the target system, which is then saturated with those replies. An IP spoofing attack is used to convince a system that it is communication with a known entity that gives an intruder access. It involves modifying the source address of a packet for a trusted source’s address. A teardrop attack consists of modifying the length and fragmentation offset fields in sequential IP packets so the target system becomes confused and crashes after it receives contradictory instructions on how the fragments are offset on these packets. A SYN attack is when an attacker floods a system with connection requests but does not respond when the target system replies to those requests. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 76).