Infa 620 network and internet security - university of


NETWORK AND INTERNET SECURITY

PROBLEM 1 - Network Access Control

a) An organization decided to implement an education program using role-based training, and wants to ensure that each role gets the necessary training based on the role. Which of the following best describes the responsibilities of data owners and indicates what training they need?
A) Ensuring data is backed up in accordance with the data policy.
B) Ensuring data is classified and labeled correctly.
C) Complying with laws related to privacy.
D) Understanding common threats, such as malware and phishing attacks.

b) Separation of duties (SoD) is a key concept of internal controls. Indicate two best answers from the following list that are elements of SoD.
A) Individuals rotate security-related duties so that no one person is permanently responsible for a sensitive function.
B) Includes two-man and dual operator controls.
C) Operators maintain an arms-length relationship with security controls.
D) Continuous retraining of personnel.
E) Ensures that no one person can compromise the whole system.

c) Which of the following is assumed when there is a deviation from the security policy of an organization?
A) Risk Assignment
B) Risk Containment
C) Risk Acceptance
D) Risk Reduction

d) In setting up a compliance program, a NAC system has several functions. Which ones are the most important?
A) Policies, authentication and access control
B) Authentication, access control and remediation
C) Authentication, access control and audit
D) Policies, remediation and audit

PROBLEM 2 - IPSec and VPN

a) You have to deploy a VPN where all remote users must use IPSec to connect to the VPN gateway but no internal hosts should use IPSec. Which of the following modes should be used?
A) host-to-host
B) host-to-gateway
C) gateway-to-gateway
D) This configuration cannot be deployed.

b) Which of the following is the simplest and most usable function of SSL VPN?
A) Application translation
B) Port forwarding
C) Proxy
D) Network extension

c) Which of the following describes the relationship between an extranet and a VPN?
A) Some extranets are VPNs; some VPNs are extranets.
B) Some extranets are VPNs; all VPNs are extranets.
C) Extranets and VPNs are the same type of network.
D) Extranets are unrelated to VPNs.

d) A company has a large number of remote workers, including traveling salespeople. Which type of VPN would be best for connecting to the company's network in a secure manner?
A) L2TP VPN.
B) IPSec VPN.
C) Site-to-Site VPN.
D) Remote-access VPN.

PROBLEM 3 - Firewalls

a) A company would like to provide for its customers Internet access in their lounge area via an unsecured wireless network. However, customers should not have access to the internal network resources of the company. Which of the following firewall rules would BEST accomplish this?
A) Block traffic from the wireless access point.
B) Content filtering on the wireless access point.
C) Packet filtering on the wireless access point.
D) Allow traffic from the wireless access point.

b) What is the major advantage of a dedicated firewall device when throughput and security are the main objectives?
A) The management console is easily installed.
B) The device contains proprietary operating systems.
C) The connection to the device is monitored by security personnel.
D) A thorough packet inspection capability.
E) The hackers know most router-based firewall code.

c) Which type of network security device was incapable of discriminating between packets originating on the internal network vs. the external network?
A) Stateful Firewall.
B) Packet Filter.
C) Stateless Firewall.
D) IDS - Intrusion Detection System.
E) None of the above

d) Which answer best describes a device that sits between your users and the internet and rewrites source ports and source IP Addresses and enhances your security posture?
A) Network Address Translator.
B) Web Proxy.
C) Web Firewall.
D) Host based firewall.

PROBLEM 4 - Wireless Network Security

a) What is the protocol developed for the wireless network communications?
A) Wireless Encryption Protocol (WEP)
B) Wireless Application Protocol (WAP)
C) Wired Equivalent Privacy (WEP)
D) Wireless Session Protocol (WSP)

b) Which of the following vulnerabilities is unique to 802.11 wireless LANs?
A) Forged deauthenticate frames
B) RF jamming
C) TCP SYN floods
D) Data sniffing

c) Your job is to configure all wireless access points to make use of a new network certificate authority. Which of the following should be used?
A) WEP
B) LEAP
C) EAP-TLS
D) TKIP

d) In order to gain access to a wireless network, an attacker intercepted the authentication traffic. What type of attack is this?
A) IV attack
B) Replay attack
C) Near field communication
D) Evil twin

PROBLEM 5 - Web and Transport Layer Security

a) The role of SSL is to _________
A) encrypt specific elements of data for application-specific purposes.
B) encrypt files located on a Web server.
C) encrypt data as it travels over a network.
D) encrypt digital certificates used to authenticate a Web site.
E) encrypt passwords for storage in a database.

b) A central hospital suffered recently a serious attack. The attackers notified that they encrypted a significant amount of data on the hospital's servers and it would remain encrypted until a substantial sum is paid. Which of the following identifies the most likely threat actor in this attack?
A) Organized crime
B) Ransomware
C) Competitors
D) Hacktivist

c) A database application on your company's database server has been repeatedly reported crashing. The detailed debugging logs revealed that just prior to crashing, the application is receiving a long series of x90 characters. This is an example of which of the following?
A) SQL injection
B) XML injection
C) Zero-day
D) Buffer overflow

d) The IDS of a company detected that the company website is under attack. The web logs show the following string, INSERT INTO message `, indicating that someone is trying to post a comment on a public bulletin board. What type of attack is this?
A) SQL injection attack
B) XML injection attack
C) XSS attack
D) Buffer overflow attack

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Infa 620 network and internet security - university of
Reference No:- TGS02871730

Now Priced at $35 (50% Discount)

Recommended (98%)

Rated (4.3/5)