Ask Computer Network & Security Expert

NETWORK AND INTERNET SECURITY

PROBLEM 1 - Network Access Control

a) An organization decided to implement an education program using role-based training, and wants to ensure that each role gets the necessary training based on the role. Which of the following best describes the responsibilities of data owners and indicates what training they need?
A) Ensuring data is backed up in accordance with the data policy.
B) Ensuring data is classified and labeled correctly.
C) Complying with laws related to privacy.
D) Understanding common threats, such as malware and phishing attacks.

b) Separation of duties (SoD) is a key concept of internal controls. Indicate two best answers from the following list that are elements of SoD.
A) Individuals rotate security-related duties so that no one person is permanently responsible for a sensitive function.
B) Includes two-man and dual operator controls.
C) Operators maintain an arms-length relationship with security controls.
D) Continuous retraining of personnel.
E) Ensures that no one person can compromise the whole system.

c) Which of the following is assumed when there is a deviation from the security policy of an organization?
A) Risk Assignment
B) Risk Containment
C) Risk Acceptance
D) Risk Reduction

d) In setting up a compliance program, a NAC system has several functions. Which ones are the most important?
A) Policies, authentication and access control
B) Authentication, access control and remediation
C) Authentication, access control and audit
D) Policies, remediation and audit

PROBLEM 2 - IPSec and VPN

a) You have to deploy a VPN where all remote users must use IPSec to connect to the VPN gateway but no internal hosts should use IPSec. Which of the following modes should be used?
A) host-to-host
B) host-to-gateway
C) gateway-to-gateway
D) This configuration cannot be deployed.

b) Which of the following is the simplest and most usable function of SSL VPN?
A) Application translation
B) Port forwarding
C) Proxy
D) Network extension

c) Which of the following describes the relationship between an extranet and a VPN?
A) Some extranets are VPNs; some VPNs are extranets.
B) Some extranets are VPNs; all VPNs are extranets.
C) Extranets and VPNs are the same type of network.
D) Extranets are unrelated to VPNs.

d) A company has a large number of remote workers, including traveling salespeople. Which type of VPN would be best for connecting to the company's network in a secure manner?
A) L2TP VPN.
B) IPSec VPN.
C) Site-to-Site VPN.
D) Remote-access VPN.

PROBLEM 3 - Firewalls

a) A company would like to provide for its customers Internet access in their lounge area via an unsecured wireless network. However, customers should not have access to the internal network resources of the company. Which of the following firewall rules would BEST accomplish this?
A) Block traffic from the wireless access point.
B) Content filtering on the wireless access point.
C) Packet filtering on the wireless access point.
D) Allow traffic from the wireless access point.

b) What is the major advantage of a dedicated firewall device when throughput and security are the main objectives?
A) The management console is easily installed.
B) The device contains proprietary operating systems.
C) The connection to the device is monitored by security personnel.
D) A thorough packet inspection capability.
E) The hackers know most router-based firewall code.

c) Which type of network security device was incapable of discriminating between packets originating on the internal network vs. the external network?
A) Stateful Firewall.
B) Packet Filter.
C) Stateless Firewall.
D) IDS - Intrusion Detection System.
E) None of the above

d) Which answer best describes a device that sits between your users and the internet and rewrites source ports and source IP Addresses and enhances your security posture?
A) Network Address Translator.
B) Web Proxy.
C) Web Firewall.
D) Host based firewall.

PROBLEM 4 - Wireless Network Security

a) What is the protocol developed for the wireless network communications?
A) Wireless Encryption Protocol (WEP)
B) Wireless Application Protocol (WAP)
C) Wired Equivalent Privacy (WEP)
D) Wireless Session Protocol (WSP)

b) Which of the following vulnerabilities is unique to 802.11 wireless LANs?
A) Forged deauthenticate frames
B) RF jamming
C) TCP SYN floods
D) Data sniffing

c) Your job is to configure all wireless access points to make use of a new network certificate authority. Which of the following should be used?
A) WEP
B) LEAP
C) EAP-TLS
D) TKIP

d) In order to gain access to a wireless network, an attacker intercepted the authentication traffic. What type of attack is this?
A) IV attack
B) Replay attack
C) Near field communication
D) Evil twin

PROBLEM 5 - Web and Transport Layer Security

a) The role of SSL is to _________
A) encrypt specific elements of data for application-specific purposes.
B) encrypt files located on a Web server.
C) encrypt data as it travels over a network.
D) encrypt digital certificates used to authenticate a Web site.
E) encrypt passwords for storage in a database.

b) A central hospital suffered recently a serious attack. The attackers notified that they encrypted a significant amount of data on the hospital's servers and it would remain encrypted until a substantial sum is paid. Which of the following identifies the most likely threat actor in this attack?
A) Organized crime
B) Ransomware
C) Competitors
D) Hacktivist

c) A database application on your company's database server has been repeatedly reported crashing. The detailed debugging logs revealed that just prior to crashing, the application is receiving a long series of x90 characters. This is an example of which of the following?
A) SQL injection
B) XML injection
C) Zero-day
D) Buffer overflow

d) The IDS of a company detected that the company website is under attack. The web logs show the following string, INSERT INTO message `, indicating that someone is trying to post a comment on a public bulletin board. What type of attack is this?
A) SQL injection attack
B) XML injection attack
C) XSS attack
D) Buffer overflow attack

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93065744
  • Price:- $35

Priced at Now at $35, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As