Question
Good afternoon, can you please assist with the following questions. If answers are unique. I will provide great feedback. Thank you very much in advance
Good afternoon, can you please assist with the following questions.
If answers are unique. I will provide great feedback. Thank you very much in advance :)
Part One
Module 08: Security Technology: Access Controls, Firewalls, and VPNs Review Questions
- What is the typical relationship among the untrusted network, the firewall, and the trusted network?
- Answer:
- What are the two primary types of network data packets? Describe their packet structures.
- Answer:
- List some authentication technologies for biometrics.
- Answer:
- How is static filtering different from dynamic filtering of packets? Which is perceived to offer improved security?
- Answer:
- What is stateful-packet inspection? How is state information maintained during a network connection or transaction?
- Answer:
- Explain the conceptual approach that should guide the creation of firewall rule sets.
- Answer:
- List some common architectural models for access control.
- Answer:
- What is the main difference between discretionary and nondiscretionary access controls?
- Answer:
- What is a hybrid firewall?
- Answer:
- Describe Unified Threat Management (UTM). How does UTM differ from Next Generation Firewalls?
- Answer:
- What is a Next Generation Firewall (NextGen or NGFW)?
- Answer:
- What is the primary value of a firewall?
- Answer:
- What is Port Address Translation (PAT), and how does it work?
- Answer:
- What are the main differences between a password and a passphrase?
- Answer:
- What is a sacrificial host? What is a bastion host?
- Answer:
- What is a DMZ?
- Answer:
- What questions must be addressed when selecting a firewall for a specific organization?
- Answer:
- What is RADIUS?
- Answer:
- What is a content filter? Where is it placed in the network to gain the best result for the organization?
- Answer:
- What is a VPN? Why is it becoming more widely used?
- Answer:
Module 09: Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools Review Questions
- What common security system is an IDPS most like? In what ways are these systems similar?
- Answer:
- How does a false positive alarm differ from a false negative alarm? From a security perspective, which is less desirable?
- Answer:
- How does a network-based IDPS differ from a host-based IDPS?
- Answer:
- How does a signature-based IDPS differ from a behavior-based IDPS?
- Answer:
- What is a monitoring (or SPAN) port? What is it used for?
- Answer:
- List and describe the three control strategies proposed for IDPSs.
- Answer:
- What is a honeypot? How is it different from a honeynet?
- Answer:
- How does a padded cell system differ from a honeypot?
- Answer:
- What is network footprinting?
- Answer:
- What is network fingerprinting?
- Answer:
- How are network footprinting and network fingerprinting related?
- Answer:
- Why do many organizations ban port scanning activities or the use of hacker tools on their internal networks?
- Answer:
- Why would ISPs ban outbound port scanning by their customers?
- Answer:
- What is an open port? Why is it important to limit the number of open ports to those that are absolutely essential?
- Answer:
- What is a system's attack surface? Why should it be minimized when possible?
- Answer:
- What is a vulnerability scanner? How is it used to improve security?
- Answer:
- What is the difference between active and passive vulnerability scanners?
- Answer:
- What is Metasploit Framework? Why is it considered riskier to use than other vulnerability scanning tools?
- Answer:
- What kind of data and information can be found using a packet sniffer?
- Answer:
- What capabilities should a wireless security toolkit include??
- Answer:
Module 10: Cryptography Review Questions
- What are cryptography and cryptanalysis?
- Answer:
- What was the earliest reason for the use of cryptography?
- Answer:
- What is a cryptographic key, and what is it used for? What is a more formal name for a cryptographic key?
- Answer:
- What are the cryptographic tools discussed in this module, and what does each accomplish?
- Answer:
- What is a hash function, and what can it be used for?
- Answer:
- What does it mean to be "out of band"? Why is it important to exchange keys out of band in symmetric encryption?
- Answer:
- What is the fundamental difference between symmetric and asymmetric encryption?
- Answer:
- How does public key infrastructure add value to an organization seeking to use cryptography to protect information assets?
- Answer:
- What are the components of PKI?
- Answer:
- What is the difference between a digital signature and a digital certificate?
- Answer:
- What critical issue in symmetric and asymmetric encryption is resolved by using a hybrid method like Diffie-Hellman?
- Answer:
- What is steganography, and what can it be used for?
- Answer:
- Which security protocols are predominantly used in web-based electronic commerce?
- Answer:
- Which security protocols are used to protect e-mail?
- Answer:
- IPSec can be implemented using two modes of operation. What are they?
- Answer:
- Which kind of attack on cryptosystems involves sequential guessing of all possible key combinations?
- Answer:
- Consider the earlier module discussion about encryption key power and key strength, and then review Table 10-5. If you were setting up an encryption-based network, what key size would you choose and why?
- Answer:
- What are the strongest key sizes used in encryption systems today?
- Answer:
- What encryption standard is currently recommended by NIST?
- Answer:
- What are the most popular protocols used to secure Internet communication?
- Answer:
Part Two
Hands-On Project: Log Management
Complete the Hands-On Project: Log Management
After completing the hands-on project, answer the following prompts
Self-Reflection and Response
What are some of the reasons you would need to look at the Windows System Log?
Breifly describe how you might manage the growth in the size of system log files. Why would you need to keep copies of log files?
How long do you think system logs shold be retained?
Hands-On Project: Footprinting
Complete the Hands-On Project: Footprinting
After completing the hands-on project, answer the following prompts
Self-Reflection and Response
Some of the activties in this lab were flagged as being considered potentially hostile unless you have permission to do them. Why would a company want to keep network users from using thse tpye of tools?
Can you think of reasons why you would need to be able to determine who controls a web address or web site?
What are some reasons you may want to use nmap on your own network?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started