CISSP Set 3 (102-152)
Terms
undefined, object
copy deck
- What is X.25?
- The first commercially successful connection oriented packet switching network where packets travel over virtual circuits.
- What is Link Access Procedure Balanced?
- For use in X.25 networks defines frame types and is capable of retransmitting, exchanging, and acknowledging frames as well as detecting out of sequence or missing frames
- What is Frame Relay?
- A high-performance WAN protocol that was originally developed for ISDN and is considered the successor to X.25/LAPB
- At what layer of the OSI model does Frame Relay operate?
- Data link
- What is the maximum effective radius of a Switched Multimegabit Data Service network?
- 30 Miles
- What is a Switched Multimegabit Data Service network use for?
- to extend LAN like performance to a MAN or WAN
- Describe an ATM network
- High-bandwidth, low delay technology that uses both switching and multiplexing. It uses 53-byte fixed size cells instead of frames
- What is a multiplexer?
- It enables several signals to be sent over one physical
- What are the private IP address ranges?
-
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255 - What are the two primary types of ISDN interfaces?
- Basic Rate Interface and Primary Rate Interface
- How many channels (up/down) comprise a Basic Rate Interface?
- Two B & one D
- How many channels (up/down) comprise a Primary Rate Interface?
- 1 Single D channel + 23/30 channels for voice and data
- What layer does the Point to Point Protocol operate at?
- Data Link
- What is the main difference between Layer 2 and Layer 3 tunneling protocols
- Layer 2 protocols use frames and Layer 3 protocols use headers
- IPSEC can support multiple ______ but not multiple _________
- simultaneous tunnels; multiple protocols
- To create an IPSEC tunnel that provides source authentication and integrity without encryption which protocol would I enable?
- AH
- To create an IPSEC tunnel that provides authentication, integrity and encryption what protocol would I use?
- ESP
- What is the early de facto standard for dial up communications
- SLIP
- What succeeded SLIP?
- PPP
- What type of authentication does PPP use?
- PAP, CHAP and MS-CHAP
- How does CHAP protect against replay attacks?
- It does not send the password in clear text an it uses an arbitrary challenge string for each authentication attempt
- How does CHAP prevent against remote client impersonation?
- By sending challenge strings at random intervals.
- What RFC defines CHAP/PAP
- RFC1334
- What is one advantage of MS-CHAP V2 over regular MS-CHAP/CHAP?
- Mutual authentication support
- What extention to EAP allows for authentication using digital certificates?
- EAP-TLS
- It can be said that TACAS and RADIUS are "standards based"...what does that mean?
- That they can interoperate with other systems of the same time.
- Is RADIUS TCP or UDP?
- UDP
- Why is RADIUS not used for router-to-router authentication?
- It does not provide support for two-way authentication
- What does TACAS+ provide that TACAS does not provide?
-
two factor password authentication
the ability for a user to change thier password
the capability for resynchronizing security tokens
better audit trails - RAID 0
- Striping
- RAID 1
- Mirroring
- RAID 2
- Hamming Code Parity (bit-interleaved parity)
- RAID 3
- Byte Level Parity
- RAID 4
- Block Level Parity
- RAID 5
- Interleave Parity
- What is te most common implementation of RAID
- RAID 5
- What is the difference between remote journaling and electronic journaling?
- Electronic vaulting happens at pretimed intervals whereas remote journaling is real time
- 802.11a
- 54 Mbps in the 5GHZ range
- 802.11b
- 11 Mbps
- 802.11g
- 54 Mbps in 2.4 GHZ band
- 802.15
- PANs
- What is 802.1X
- Port based authentication for security in wireless networks
- What is LEAP
- it dynamically creates WEP keys making WEP more secure.
- What are the two different spread spectrum technologies in use in 2.4GHZ LANs
- Direct-dequence spread spectrum(DSSS) and frequency hopping spread spectrum (FHSS)
- How many non-overlapping channels are used in DSSS?
- Typically 3
- What are the FCC regulations for FHSS networks?
- 75 or more frequencies can be used with a maximum dwell time of 400ms
- What are the five layers of WAP?
- application, session, transaction, security and transport
- What does the application layer of WAP consist of?
- The wireless application environment (WAE), a microbrowser specification for internet access, wireless markup language, WMLScript
- What does the Transport layer of the WAP consist of?
- Wireless Datagram Protocol
- What are the three classes of WTLS security?
-
Class 1: anonymous authentication
Class 2: Server Authentication
Class 3: Two-way client and server authentication