16.
Which of the following is
not
a technology specifically associated with 802.11 wireless
networking?
A.
WAP
B.
WPA
C.
WEP
D.
802.11i
17.
Which wireless frequency access method offers the greatest throughput with the least
interference?
A.
FHSS
B.
DSSS
C.
OFDM
D.
OSPF
18.
What security concept encourages administrators to install firewalls, malware scanners,
and an IDS on every host?
A.
Endpoint security
B.
Network access control (NAC)
C.
VLAN
D.
RADIUS
520
Chapter 11
■
Secure Network Architecture and Securing Network Components
19.
What function does ARP perform?
A.
It is a routing protocol.
B.
It resolves IP addresses into MAC addresses.
C.
It resolves physical addresses into logical addresses.
D.
It manages multiplex streaming.
20.
What form of infrastructure mode wireless networking deployment supports large physical
environments through the use of a single SSID but numerous access points?
A.
Stand-alone
B.
Wired extension
C.
Enterprise extension
D.
Bridge
Chapter
12
Secure
Communications
and Network Attacks
The CISSP exAm ToPICS Covered IN
ThIS ChAPTer INClude:
✓
Domain 4: Communication and Network Security
■
4.3 Implement secure communication channels according
to design
■
4.3.1 Voice
■
4.3.2 Multimedia collaboration
■
4.3.3 Remote access
■
4.3.4 Data communications
■
4.3.5 Virtualized networks
Data residing in a static form on a storage device is fairly
simple to secure. As long as physical access control is main-
tained and reasonable logical access controls are implemented,
stored files remain confidential, retain their integrity, and are available to authorized users.
However, once data is used by an application or transferred over a network connection, the
process of securing it becomes much more difficult.
Communications security covers a wide range of issues related to the transportation
of electronic information from one place to another. That transportation may be between
systems on opposite sides of the planet or between systems on the same business network.
Once it is involved in any means of transportation, data becomes vulnerable to a plethora
of threats to its confidentiality, integrity, and availability. Fortunately, many of these
threats can be reduced or eliminated with the appropriate countermeasures.
Communications security is designed to detect, prevent, and even correct data transportation
errors (that is, it provides integrity protection as well as confidentiality). This is done to sustain
the security of networks while supporting the need to exchange and share data. This chapter
covers the many forms of communications security, vulnerabilities, and countermeasures.
The Communication and Network Security domain for the CISSP certification exam
deals with topics related to network components (i.e., network devices and protocols),
specifically how they function and how they are relevant to security. This domain is
discussed in this chapter and in Chapter 11, “Secure Network Architecture and Securing
Network Components.” Be sure to read and study the material in both chapters to ensure
complete coverage of the essential material for the CISSP certification exam.
Network and Protocol Security
Mechanisms
Transmission Control Protocol/Internet Protocol (TCP/IP)
is the primary protocol suite
used on most networks and on the internet. It is a robust protocol suite, but it has numer-
ous security deficiencies. In an effort to improve the security of TCP/IP, many subprotocols,
mechanisms, or applications have been developed to protect the confidentiality, integrity, and
availability of transmitted data. It is important to remember that even with the foundational
protocol suite of TCP/IP, there are literally hundreds, if not thousands, of individual pro-
tocols, mechanisms, and applications in use across the internet. Some of them are designed
to provide security services. Some protect integrity, others protect confidentiality, and others
provide authentication and access control. In the next sections, we’ll discuss some of the more
common network and protocol security mechanisms.
Network and Protocol Security Mechanisms
Do'stlaringiz bilan baham: |