181. Most hardware/software guard implementations use which of the following approaches?
a. Private network
b. Dual network
c. Public network
d. Backbone network
Hardware and/or software guards enable users to exchange data between private and public networks, which is normally prohibited because of information confidentiality. A combination of hardware and/or software guards is used to allow secure local-area network (LAN) connectivity between enclave boundaries operating at different security classification levels (i.e., one private and the other public).
182. For active attacks on hardware/software guards, which of the following are countermeasures against manipulation of data on the private network?
1. Encryption algorithms
2. Key management processes
3. Cryptographic authentication
4. Data-separation methods
a. 1 and 2
b. 1 and 3
c. 3 and 4
d. 1, 2, 3, and 4
183. Which of the following is
a. Session hijacking
b. Invalidated input
c. Ping of death
d. SYN flood
184. For active attacks on hardware/software guards, which of the following are countermeasures against modification of data in transit?
1. Timestamps
2. Sequence numbers
3. Digital signatures
4. Keyed hash integrity checks
a. 1 and 2
b. 1 and 3
c. 3 and 4
d. 1, 2, 3, and 4
185. Most attacks are targeted at which of the following Transmission Control Protocol/Internet Protocol (TCP/IP) layers?
a. Application layer
b. Transport layer
c. Network layer
d. Data link layer
Hypertext transfer protocol (HTTP) is a function of the application layer, along with DNS, SMTP, FTP, and SNMP. This layer sends and receives data for particular applications. The transport layer provides connection-oriented or connectionless services for transporting application layer services between networks. The network layer routes packets across networks. The data link layer handles communications on the physical network components.
186. Which of the following statements about media access control/medium access control (MAC) address are true?
1. Each frame contains two MAC addresses.
2. Each frame contains either IP or ARP.