Answers to Questions 46-50
46. An extranet can be viewed as part of a company's intranet that is extended to users:
A. Outside the company
B. Inside the company
C. With administrator privileges
D. With root privileges
Explanation: An extranet is a private network that uses the Internet protocol and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses. An extranet can be viewed as part of a company's intranet that is extended to users outside the company. It has also been described as a "state of mind" in which the Internet is perceived as a way to do business with other companies as well as to sell products to customers. The same benefits that HTML, Hypertext Transfer Protocol (HTTP), Simple Mail Transfer Protocol (SMTP), and other Internet technologies have brought to the Internet and to corporate intranets now seem designed to accelerate business between businesses.
Typically the portion of a company's network inside the company is referred to as its intranet. Generally extranet users do not have administrator or root privileges.
& Section 3.1.8: VPN (Virtual Private Network)
& Section 22.214.171.124: Extranet
47. Why is fiber optics a better transmission medium than copper wire?
A. Carries more data
B. Less subject to electromagnetic interference
C. More secure
D. No Answer is Correct
Explanation: Fiber optic (or "optical fiber") refers to the medium and the technology associated with the transmission of information as light impulses along a glass or plastic wire or fiber. Fiber optic wire carries much more information than conventional copper wire and is far less subject to electromagnetic interference. Most telephone company long-distance lines are now fiber optic.
& Section 3.2.3: Fiber
48. NAT functionality is frequently found in which of the following devices?
C. Router and firewall
D. File server and switch
Explanation: NAT, or Network Address Translation, is included as part of a router and is often part of a corporate firewall. Network administrators create a NAT table that does the global-to-local and local-to-global IP address mapping. NAT can also be used in conjunction with policy routing. NAT can be statically defined or it can be set up to dynamically translate from and to a pool of IP addresses.
Typically hubs and switches work at lower levels of the IP protocol stack than NAT does.
& Section 3.3.3: NAT (Network Address Translation)
49. A router operates on layer 3. This means a packet sniffer can access
A. Can expose the entire network
B. Only the subnet that the packet sniffer exists on
C. Only the host on which the packet sniffer is located
D. No choice is correct
Explanation: A router performs by directing IP traffic based on source and destination IP addresses. That would limit sniffing to the sub network area. If the packet sniffer is at the router, it can monitor everything that moves through the router. (Of course, if a cracker can manipulate the router to route additional traffic over to the subnet the cracker has compromised, that traffic can be seen as well. They key is that the packets have to be passing through the subnet on which the sniffer is installed.)
& Section 3.1.2: Routers
50. A subnet can be isolated from sniffing by what?
Explanation: While a router will limit exposure via directed IP traffic, a switch will screen to the sub-net level by using MAC addresses. Do be aware that deploying switches does not make you totally immune to sniffing, as switches were not designed to segment traffic for security reasons, and many have at least one vulnerability that reduces their effectiveness for security.
& Section 3.1.3: Switches
Home - Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.