Read this whole guide offline with no ads, for a low price!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Need more practice? 300 additional Security+ questions!
Get It Here!

Custom Search

Table Of Contents  CertiGuide to Security+
 9  Chapter 7:  Practice Exam Answers

Previous Topic/Section
Answers to Questions 41-45
Previous Page
Pages in Current Topic/Section
Next Page
Answers to Questions 51-55
Next Topic/Section

Answers to Questions 46-50

46. An extranet can be viewed as part of a company's intranet that is extended to users:

A. Outside the company

B. Inside the company

C. With administrator privileges

D. With root privileges

Explanation: An extranet is a private network that uses the Internet protocol and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses. An extranet can be viewed as part of a company's intranet that is extended to users outside the company. It has also been described as a "state of mind" in which the Internet is perceived as a way to do business with other companies as well as to sell products to customers. The same benefits that HTML, Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), and other Internet technologies have brought to the Internet and to corporate intranets now seem designed to accelerate business between businesses.

Typically the portion of a company's network inside the company is referred to as its intranet. Generally extranet users do not have administrator or root privileges.

& Section 3.1.8: VPN (Virtual Private Network)

& Section Extranet


47. Why is fiber optics a better transmission medium than copper wire?

A. Carries more data

B. Less subject to electromagnetic interference

C. More secure

D. No Answer is Correct

Explanation: Fiber optic (or "optical fiber") refers to the medium and the technology associated with the transmission of information as light impulses along a glass or plastic wire or fiber. Fiber optic wire carries much more information than conventional copper wire and is far less subject to electromagnetic interference. Most telephone company long-distance lines are now fiber optic.

& Section 3.2.3: Fiber


48. NAT functionality is frequently found in which of the following devices?

A. Router

B. Hub

C. Router and firewall

D. File server and switch

Explanation: NAT, or Network Address Translation, is included as part of a router and is often part of a corporate firewall. Network administrators create a NAT table that does the global-to-local and local-to-global IP address mapping. NAT can also be used in conjunction with policy routing. NAT can be statically defined or it can be set up to dynamically translate from and to a pool of IP addresses.

Typically hubs and switches work at lower levels of the IP protocol stack than NAT does.

& Section 3.3.3: NAT (Network Address Translation)


49. A router operates on layer 3. This means a packet sniffer can access

A. Can expose the entire network

B. Only the subnet that the packet sniffer exists on

C. Only the host on which the packet sniffer is located

D. No choice is correct

Explanation: A router performs by directing IP traffic based on source and destination IP addresses. That would limit sniffing to the sub network area. If the packet sniffer is at the router, it can monitor everything that moves through the router. (Of course, if a cracker can manipulate the router to route additional traffic over to the subnet the cracker has compromised, that traffic can be seen as well. They key is that the packets have to be passing through the subnet on which the sniffer is installed.)

& Section 3.1.2: Routers


50. A subnet can be isolated from sniffing by what?

A. Hub

B. Switch

C. Router

D. Repeater

Explanation: While a router will limit exposure via directed IP traffic, a switch will screen to the sub-net level by using MAC addresses. Do be aware that deploying switches does not make you totally immune to sniffing, as switches were not designed to segment traffic for security reasons, and many have at least one vulnerability that reduces their effectiveness for security.

& Section 3.1.3: Switches

Previous Topic/Section
Answers to Questions 41-45
Previous Page
Pages in Current Topic/Section
Next Page
Answers to Questions 51-55
Next Topic/Section

If you find useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $

Home - Table Of Contents - Contact Us

CertiGuide for Security+ ( on
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al. Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.