Systems Security Certified Practitioner – SSCP – Question0914

What is called an attack in which an attacker floods a system with connection requests but does not respond when the target system replies to those requests?

A.
Ping of death attack
B. SYN attack
C. Smurf attack
D. Buffer overflow attack

Correct Answer: B

Explanation:

A SYN attack occurs when an attacker floods the target system’s small “in-process” queue with connection requests, but it does not respond when the target system replies to those requests. This causes the target system to “time out” while waiting for the proper response, which makes the system crash or become unusable. A buffer overflow attack occurs when a process receives much more data than expected. One common buffer overflow attack is the ping of death, where an attacker sends IP packets that exceed the maximum legal length (65535 octets). A smurf attack is an attack where the attacker spoofs the source IP address in an ICMP ECHO broadcast packet so it seems to have originated at the victim’s system, in order to flood it with REPLY packets. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 76).

Systems Security Certified Practitioner – SSCP – Question0913

Which type of attack consists of modifying the length and fragmentation offset fields in sequential IP packets?

A.
Teardrop attack
B. Smurf attack
C. SYN attack
D. Buffer overflow attack

Correct Answer: A

Explanation:

A teardrop attack consists of modifying the length and fragmentation offset fields in sequential IP packets so the target system becomes confused and crashes after it receives contradictory instructions on how the fragments are offset on these packets. A SYN attack is when an attacker floods a system with connection requests but does not respond when the target system replies to those requests. A smurf attack is an attack where the attacker spoofs the source IP address in an ICMP ECHO broadcast packet so it seems to have originated at the victim’s system, in order to flood it with REPLY packets. A buffer overflow attack occurs when a process receives much more data than expected. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 76).

Systems Security Certified Practitioner – SSCP – Question0912

What is a TFTP server most useful for?

A.
Transferring configurations to and from network devices.
B. Transferring files to web servers.
C. Terminal access to network devices.
D. Terminal access to file servers.

Correct Answer: A

Explanation:

A Trivial File Transfer Protocol (TFTP) server can be used when configuring network devices to transfer configurations to and from network devices. Many networking devices now support TFTP. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 73).

Systems Security Certified Practitioner – SSCP – Question0911

Frame relay uses a public switched network to provide:

A.
Local Area Network (LAN) connectivity.
B. Metropolitan Area Network (MAN) connectivity.
C. Wide Area Network (WAN) connectivity.
D. World Area Network (WAN) connectivity.

Correct Answer: C

Explanation:

Frame relay uses a public switched network to provide Wide Area Network (WAN) connectivity. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 73.

Systems Security Certified Practitioner – SSCP – Question0910

A common way to create fault tolerance with leased lines is to group several T1s together with an inverse multiplexer placed:

A.
at one end of the connection.
B. at both ends of the connection.
C. somewhere between both end points.
D. in the middle of the connection.

Correct Answer: B

Explanation:

A common way to create fault tolerance with leased lines is to group several T1s together with an inverse multiplexer placed at both ends of the connection.
In fact it would be a Multiplexer at one end and DeMultiplexer at other end or vice versa. Inverse Multiplexer at both end.
In electronics, a multiplexer (or mux) is a device that selects one of several analog or digital input signals and forwards the selected input into a single line. A multiplexer of 2n inputs has n select lines, which are used to select which input line to send to the output. Multiplexers are mainly used to increase the amount of data that can be sent over the network within a certain amount of time and bandwidth. A multiplexer is also called a data selector.
An electronic multiplexer makes it possible for several signals to share one device or resource, for example one A/D converter or one communication line, instead of having one device per input signal.
On the other hand, a demultiplexer (or demux) is a device taking a single input signal and selecting one of many data-output-lines, which is connected to the single input. A multiplexer is often used with a complementary demultiplexer on the receiving end. An electronic multiplexer can be considered as a multiple-input, single-output switch, and a demultiplexer as a single-input, multiple-output switch
References: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 72. and https://secure.wikimedia.org/wikipedia/en/wiki/Multiplexer

Systems Security Certified Practitioner – SSCP – Question0909

Which of the following is a token-passing scheme like token ring that also has a second ring that remains dormant until an error condition is detected on the primary ring?

A.
Fiber Distributed Data Interface (FDDI).
B. Ethernet
C. Fast Ethernet
D. Broadband

Correct Answer: A

Explanation:

FDDI is a token-passing ring scheme like a token ring, yet it also has a second ring that remains dormant until an error condition is detected on the primary ring.
Fiber Distributed Data Interface (FDDI) provides a 100 Mbit/s optical standard for data transmission in a local area network that can extend in range up to 200 kilometers (124 miles). Although FDDI logical topology is a ring-based token network, it does not use the IEEE 802.5 token ring protocol as its basis; instead, its protocol is derived from the IEEE 802.4 token bus timed token protocol. In addition to covering large geographical areas, FDDI local area networks can support thousands of users. As a standard underlying medium it uses optical fiber, although it can use copper cable, in which case it may be refer to as CDDI (Copper Distributed Data Interface). FDDI offers both a Dual-Attached Station (DAS), counter-rotating token ring topology and a Single-Attached Station (SAS), token bus passing ring topology.
Ethernet is a family of frame-based computer networking technologies for local area networks (LANs). The name came from the physical concept of the ether. It defines a number of wiring and signaling standards for the Physical Layer of the OSI networking model as well as a common addressing format and Media Access Control at the Data Link Layer.
In computer networking, Fast Ethernet is a collective term for a number of Ethernet standards that carry traffic at the nominal rate of 100 Mbit/s, against the original Ethernet speed of 10 Mbit/s. Of the fast Ethernet standards 100BASE-TX is by far the most common and is supported by the vast majority of Ethernet hardware currently produced. Fast Ethernet was introduced in 1995 and remained the fastest version of Ethernet for three years before being superseded by gigabit Ethernet.
Broadband in data can refer to broadband networks or broadband Internet and may have the same meaning as above, so that data transmission over a fiber optic cable would be referred to as broadband as compared to a telephone modem operating at 56,000 bits per second. However, a worldwide standard for what level of bandwidth and network speeds actually constitute Broadband have not been determined.[1]
Broadband in data communications is frequently used in a more technical sense to refer to data transmission where multiple pieces of data are sent simultaneously to increase the effective rate of transmission, regardless of data signaling rate. In network engineering this term is used for methods where two or more signals share a medium.[Broadband Internet access, often shortened to just broadband, is a high data rate Internet access—typically contrasted with dial-up access using a 56k modem.
Dial-up modems are limited to a bitrate of less than 56 kbit/s (kilobits per second) and require the full use of a telephone line— whereas broadband technologies supply more than double this rate and generally without disrupting telephone use.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 72.
also see: http://en.wikipedia.org/

Systems Security Certified Practitioner – SSCP – Question0908

Which of the following was designed as a more fault-tolerant topology than Ethernet, and very resilient when properly implemented?

A.
Token Link.
B. Token system.
C. Token Ring.
D. Duplicate ring.

Correct Answer: C

Explanation:

Token Ring was designed to be a more fault-tolerant topology than Ethernet, and can be a very resilient topology when properly implemented. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 72.

Systems Security Certified Practitioner – SSCP – Question0907

Which cable technology refers to the CAT3 and CAT5 categories?

A.
Coaxial cables
B. Fiber Optic cables
C. Axial cables
D. Twisted Pair cables

Correct Answer: D

Explanation:

Twisted Pair cables currently have two categories in common usage. CAT3 and CAT5. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 72.

Systems Security Certified Practitioner – SSCP – Question0906

Which of the following elements of telecommunications is not used in assuring confidentiality?

A.
Network security protocols
B. Network authentication services
C. Data encryption services
D. Passwords

Correct Answer: D

Explanation:

Passwords are one of the multiple ways to authenticate (prove who you claim to be) an identity which allows confidentiality controls to be enforced to assure the identity can only access the information for which it is authorized. It is the authentication that assists assurance of confidentiality not the passwords.
“Network security protocols” is incorrect. Network security protocols are quite useful in assuring confidentiality in network communications.
“Network authentication services” is incorrect. Confidentiality is concerned with allowing only authorized users to access information. An important part of determining authorization is authenticating an identity and this service is supplied by network authentication services.
“Data encryption services” is incorrect. Data encryption services are quite useful in protecting the confidentiality of information.
Reference(s) used for this question: Official ISC2 Guide to the CISSP CBK, pp. 407 -520 AIO 3rd Edition, pp. 415 -580

Systems Security Certified Practitioner – SSCP – Question0905

The Telecommunications Security Domain of information security is also concerned with the prevention and detection of the misuse or abuse of systems, which poses a threat to the tenets of:

A.
Confidentiality, Integrity, and Entity (C.I.E.).
B. Confidentiality, Integrity, and Authenticity (C.I.A.).
C. Confidentiality, Integrity, and Availability (C.I.A.).
D. Confidentiality, Integrity, and Liability (C.I.L.).

Correct Answer: C

Explanation:

The CIA acronym stands for Confidentiality, Integrity and Availability.
“Confidentiality, Integrity and Entity (CIE)” is incorrect. “Entity” is not part of the telecommunications domain definition.
“Confidentiality, Integrity and Authenticity (CIA)” is incorrect. While authenticity is included in the telecommunications domain, CIA is the acronym for confidentiality, integrity and availability.
“Confidentiality, Integrity, and Liability (CIL)” is incorrect. Liability is not part of the telecommunications domain definition.
References: CBK, pp. 407 -408