Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

There are 10 multiple choice questions regarding basic network security. I had answered what I thought would be the correct answers. If I am incorrect, please offer the correct answer along with your comments as to why your answers are correct.

1. Why are computer networks so difficult to secure?

a. User Anonymity

b. Networks are complex, dynamic, and difficult to understand and verify

c. There are many points of attack, making it difficult to completely secur

d. All of the above

My answer is all of the above

2. Which of the following are shortcomings of most intrusion detection systems?

a. Their effectiveness is based upon where you put them in your network.

b. Too may false alarms can cause an operator to disbelieve bona fide attacks.

c. They need to be continually updated to recognize the latest attacks.

d. They are limited in their ability to detect intrusive activity within encrypted data packets/sessions.

e. All of the above

My anser is C.

3. An intrusion detection sensor and "sniffer" have this in common.

a. They evesdrop on all network data looking for patterns of interest

b. It is difficult to detect that either is running somewhere on the network

c. They collect and store network information

d. All of the above

e. None of the above

My Answer is A but I am not sure

4. I used my firewall rule table to filter out (deny) IP addresses of "bad guys". Am I safe?

a. Yes, because I can accurately determine the packet sender from the IP address

b. No, because the attacker can put a fictitious source IP his/her packet.

c. Not necessarily, because the attacker may use micro-fragmentation to prevent the firewall from assembling the entire packet and reading the important TCP/UDP port information.

d. All but (A)

5. My answer is C

When placing VPN hardware on your corporate network to harness the Internet, you should consider placing it:

a. Just inside of your wireless access point

b. It depends on the operational needs and security model of your company.

c. Just outside of your corporate firewall

d. So that your network intrusion detection system can only see encrypted packets transmitted by the VPN hardware.

I am not sure what a VPN is actually...

6. My company is located in three geographical locations and is connected via the Internet. I purchase one Class C network and then assign contiguous blocks of IP addresses (subnets) to each location. The Internet has the capability to route between my locations. Twenty years ago, this would not have been possible. This is possible mostly due to the introduction of:

a. TCP

b. Classless Internet Domain Routing (CIDR)

c. Encryption

d. Firewalls

My answer would be d however I am confusing it with TCP.

7. The process of adding headers and trailers to an application data packet prior to transport over a network is called:

a. Encapsulation

b. Sequencing

c. Fragmentation

d. Complication

My answer would be a.

8.To securely encrypt data between company branch offices, using the public Internet as the communication network, I would use:

a. QoS Encryption

b. Link Encryption

c. A VPN

d. A firewall

My guess would be d.

9.I entered 'www.cybercrime.com' in my web browser and the web site comes up on my computer. How did the computer find this web server's IP address?

a. Domain Name Services (DNS)

b. Address Resolution Protocol (ARP)

c. Border Gateway Protocol (BGP)

d. Dynamic Host Configuration Protocol (DHCP)

My answer would be a.

10.Computers really communicate using their hardware (MAC) addresses. What service performs the translation between a computer's MAC and IP addresses?

a. Domain Name Services (DNS)

b. Border Gateway Protocol (BGP)

c. Dynamic Host Configuration Protocol (DHCP)

d. Address Resolution Protocol (ARP)

My answer would be b but I am confusing this with a.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91618596
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Nbspfor the remaining questions consider a 4-bit block

For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 2 f 1 You c ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Part ian attacker seeks to view the contents of a specific

Part I An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that: - no exploitable vulnerabilities of any kind exist; - the attack ...

What is the difference between a positive economic

What is the difference between a positive economic statement and a normative one.

Case study network design for ezy-booksezy-books is a

Case Study: Network Design for EZY-Books EZY-Books is a specialised publisher for customised book publication services based in Brisbane. The company has recently purchased a two-story building in a Brisbane suburb as it ...

Question snmp initially appeared in 1988 but it did not

Question : SNMP initially appeared in 1988, but it did not receive widespread adoption. What have been the issues with SNMP, and have they been addressed? How widely used is SNMP now? Find some examples of tools that use ...

Question what is active threat in terms of network security

Question: What is active threat in terms of network security? Provide an example. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format. Note: minimum 300 wor ...

This is from a practical exercise the answers are below but

This is from a practical exercise. The answers are below BUT, I do not know how they came up with them. I'd like a step-by-step explanation of how they got the answers. Practical Exercise 1: Assume the demand for teacher ...

Research assignmentproduce a formal 2000 word report in the

Research Assignment Produce a formal 2000 word report, in the format described in the supplied "Reports format and style" document, examining the various "Transition from IPv4 to IPv6". You are to research and compare th ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As