As you analyze the settings of the Secure Server (Require Security) IPSec policy in Windows Server
2003, you are looking at the options available for encryption and integrity. Which of the following answers presents a legitimate combination for encryption and integrity in the IPSec policy?
During a network analysis session, you capture several TCP/IP sessions. You focus your analysis on the
IP Headers. In an IP Header, what is the function of the first four bits?
You are configuring the Access Lists for your new Cisco Router. The following are the commands that are entered into the router for the list configuration.
Router(config)#access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 80
Router(config)#access-list 171 deny tcp 0.0.0.0 255.255.255.255 10.10.0.0 0.0.255.255 eq 80
Router(config)#access-list 171 deny tcp any any eq 23
Router(config)#access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 20
Router(config)# access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 21
Based on this configuration, and using the exhibit, select the answers that identify how the router will deal with network traffic.
You need to install a new antenna for the wireless network available on your companys property. Which antenna type is best for extending the local range of an Access Point?
In your current organization, you have been given the task of implementing the IPSec solution. All your servers are running Windows Server 2003, so you wish to use the built in policies. What are the three default IPSec policies in Windows Server 2003?
You have just installed a new Intrusion Detection System in your network. You are concerned that there are functions this system will not be able to perform. What is a reason an IDS cannot manage hardware failures?
During a training presentation, that you are delivering, you are asked how wireless networks function, compared to the OSI Model. What two layers of the OSI Model are addressed by the 802.11 standards?
A significant function of TCP is the ability to guarantee session information. The method used by TCP to guarantee the uniqueness of a session between two hosts is which of the following?
You are configuring a L2TP solution between your office and your primary branch office. The CEO has requested a report on the benefits of using this technology. Which of the following benefits does L2TP (with IPSec) provide?
The main reason you have been hired at a company is to bring the network security of the organization up to current standards. A high priority is to have a full security audit of the network as soon as possible. You have chosen an Operational Audit and are describing it to your coworkers. Which of the following best describes an Operational audit?
You are configuring the rules on your firewall, and need to take into consideration that some clients in the
network are using automatic addressing. What is the IP address range reserved for internal use for APIPA in Microsoft networks?
You are planning on implementing a token-based authentication system in your network. The network currently is spread out over four floors of your building. There are plans to add three branch offices. During your research you are analyzing the different types of systems. Which of the following are the two common systems token-based authentication uses?
As you increase the layers of security in your organization, you must watch the network behavior closely.
How can a firewall have a negative impact on the performance of your network?
What is the function of the following configuration fragment?
Router(config)#line vty 0 4
Router(config-line)#transport input ssh telnet
In the image, there are two nodes communicating directly, without an access point. In the packet on the right side of the image, the Address 1 field is blank. If this packet is going to the other computer, what is the value that must be filled in this blank address field?
There are several options available to you for your new wireless networking technologies, and you are examining how different systems function. What transmission system uses short bursts combined together as a channel?
You are concerned that your Access Point security could be improved. What does an Access Point use to announce its SSID to the network?
You have been given the task of installing a new firewall system for your network. You are analyzing the different implementation options. Which of the following best describes a Single Packet Filtering Device?
You have just installed a new network-based IDS for your organization. You are in the middle of your initial configuration of the system, and are now configuring the response. What is the most common response of an IDS when an event happens?
After installing Snort on your Windows machine that is destined to be your IDS, you need to edit the configuration file to customize it to your needs. What is the name of that configuration file?
You are going to add another computer to the pool that you use for detecting intrusions. This time you are making a customized Snort machine running on Windows 2000 Professional. Prior to running Snort you must install which of the following programs?
You have made some changes to the configuration of your ISA Server 2006 firewall. While analyzing the network traffic, you see that these changes have not yet taken affect. What must you do to get these new rules to take function?
It has been decided that you must implement new security on your wireless networks. What wireless protection system is defined as: MIC + TKIP + EAP + 802.1x?
What tool used in wireless network analysis has the ability to output its findings to MapPoint?
One of the firewall choices you are thinking of implementing, in your network, is a proxy server. A proxy server can accomplish which of the following statements?
There are several options for you to choose from when building your wireless security solution. Wireless
Transport Layer Security is based on which fundamental security technology?
You have been hired at a large company to manage network security issues. Prior to your arrival, there was no one dedicated to security, so you are starting at the beginning. You hold a meeting and are discussing the main functions and features of network security. One of your assistants asks what the function of Authentication in network security is. Which of the following best describes Authentication?
You have recently taken over the security of a mid-sized network. You are reviewing the current configuration of the IPTables firewall, and notice the following rule:
ipchains -A output -p TCP -d 126.96.36.199 ! www
What is the function of this rule?
As Intrusion Detection Systems become more sophisticated, the software manufacturers develop different methods of detection. If an IDS uses the process of finding a deviation from a well know pattern of user behavior, what is this known as?
After installing Snort on your windows machine that is destined to be your IDS, you need to edit the configuration files entry of "HOME_NET" to define which of the following?
During your packet capture of traffic to check if your network is getting hit by a Denial of Service attack, you analyze TCP headers. You notice there are many headers that seem to have the same SEQ number, with the responding computer using different SEQ and ACK numbers in response. If you are analyzing a normal three-way handshake between two Windows 2000 nodes, and the first packet has a SEQ of
0xD36077AF, what will the responding computer use as an ACK?
You are reconfiguring your networks firewall to create a DMZ using three network interfaces. After configuring the addresses on the interfaces, you are making the required changes in ISA Server 2006. You are going to use Network Template during this configuration change. What Network Template is designed for this firewall topology?
You are considering adding layers to your authentication system currently in place. Reading through some of the vendor literature on logon solutions, it frequently mentions two and three factor authentication. Your assistant asks you what the difference between the two is. Select the options that correctly describe two-factor and three-factor authentication:
You are configuring a new custom IPSec policy on your Windows Server 2003 machine. On the rules tab, you find the three default options under the IP Filter List. What are these three default options?