Читаем CISSP Practice полностью

Network monitoring tools are an example of a detective control used by network management. As such they do not show any accountability of the user. They watch the network traffic and develop trends.

Lock and key systems and card key systems are examples of preventive controls as a part of physical security. Keys can be lost or stolen, and, therefore, accountability is difficult to prove and control.

85. Attackers use which of the following to distribute their warez files?

a. File transfer protocol server

b. SOCKS server

c. Web proxy server

d. E-mail server

85. a. A warez server is a file server used to distribute illegal content such as copies of copyrighted songs, movies, and pirated software. Attackers often exploit vulnerabilities in file transfer protocol (FTP) servers to gain unauthorized access so that they can use the server to distribute their warez files.

The socket security (SOCKS) server is a networking-proxy protocol that enables full access across the SOCKS server from one host to another without requiring direct IP reachability. Web proxy servers are used to access external websites. E-mail servers can be used to do proper things such as sending normal messages and sending malicious code.

86. Which of the following networks provides for movement of employees within an organization without the associated cabling costs?

a. Traditional local-area networks (LANs)

b. Metropolitan-area networks (MANs)

c. Virtual local-area networks (VLANs)

d. Value-added networks (VANs)

86. c. Virtual LANs are a logical collection of individual LANs, because they link local- and wide-area networks using routers, switches, and backbone equipment and related software so that users at various locations have access to data residing on multiple systems and locations that they would not have otherwise. The virtual network is transparent to users. Virtual LANs reassign users without changing cables when users move from one location to another. Network maintenance costs are lower and equipment moves are done faster. Another benefit of virtual LANs is that all servers in a building can be physically protected in a data center instead of spreading them throughout the building in the user departments.

Traditional (wired) LANs are incorrect because they require a change of cabling when users and their equipment move around. Network maintenance costs are higher and moves are slower. MANs and VANs are incorrect because they do not employ cables as traditional LANs do.

87. Frame relay and X.25 networks are part of which of the following?

a. Circuit-switched services

b. Cell-switched services

c. Packet-switched services

d. Dedicated digital services

87. c. Packet-switched services are better suited to handle bursts of traffic. In packet-switched services, connections do not need to be established before data transmission begins. Instead, each packet is transmitted separately, and each may take a separate path through the mesh of network. X.25 networks are slow and are not suitable for most LAN-to-LAN traffic because of the time and bandwidth required for error checking by X.25. Frame relays, which are similar to X.25, provide faster and more efficient services. Frame relay does not employ the extensive error checking of X.25.

Circuit-switched services are incorrect because they are better suited for delay-sensitive traffic. They establish a virtual connection before transmitting data. They do not use X.25 and frame relay protocols.

Cell-switched services are incorrect because they use a fixed-size cell rather than a variable-size packet (e.g., asynchronous transfer mode networks). This type of switching is faster and less expensive. They do not use X.25 and frame relay protocols either.

Dedicated digital services are incorrect because they handle voice, video, and data. The dedicated lines are usually leased and installed between two points to provide dedicated, full-time service. T1 and T3 are examples of dedicated digital lines.

88. Which of the following statements is not true? Intranets differ from the GroupWare concept in that intranets

a. Are platform-dependent.

b. Are platform-independent.

c. Use layered communication protocols.

d. Are easy to set up.

Перейти на страницу:

Похожие книги

Масштаб. Универсальные законы роста, инноваций, устойчивости и темпов жизни организмов, городов, экономических систем и компаний
Масштаб. Универсальные законы роста, инноваций, устойчивости и темпов жизни организмов, городов, экономических систем и компаний

Жизненными циклами всего на свете – от растений и животных до городов, в которых мы живем, – управляют универсальные скрытые законы. Об этих законах – законах масштабирования – рассказывает один из самых авторитетных ученых нашего времени, чьи исследования совершили переворот в науке. «Эта книга – об объединенной и объединяющей системе концепций, которая позволила бы подступиться к некоторым из крупнейших задач и вопросов, над которыми мы бьемся сегодня, от стремительной урбанизации, роста населения и глобальной устойчивости до понимания природы рака, обмена веществ и причин старения и смерти. О замечательном сходстве между принципами действия городов, компаний и наших собственных тел и о том, почему все они представляют собой вариации одной общей темы, а их организация, структура и динамика с поразительной систематичностью проявляют сходные черты. Общим для всех них является то, что все они, будь то молекулы, клетки или люди, – чрезвычайно сложные системы, состоящие из огромного числа индивидуальных компонентов, взаимосвязанных, взаимодействующих и развивающихся с использованием сетевых структур, существующих на нескольких разных пространственных и временных масштабах…» Джеффри Уэст

Джеффри Уэст

Деловая литература / Зарубежная образовательная литература, зарубежная прикладная, научно-популярная литература / Финансы и бизнес