File transfer protocol

Assignment Help Computer Networking
Reference no: EM13755704

Part A:

1. Most remote configuration and administration uses the _______ protocol?

2. SSH stands for?

3. The File Transfer Protocol (FTP) uses which transport protocol, TCP or UDP?

4. From a security standpoint, it is more desirable to use the numeric IP address of a static IP host, such as an e-mail server, than to allow the address to be looked up the Domain Name Service. True or False?

5. Because the e-mail server will not be required to run a browser, which protocol is not allowed by the firewall rules?

6. Because the e-mail server uses a fixed, static, predetermined IP address, which protocol is not used, and, therefore, not specifically allowed to pass through the firewall?

7. Hyper Text Transfer Protocol (HTTP) and Secure HTTP (HTTPS) are the same protocol from a standpoint of passing or blocking them with a firewall. True or False?

8. Which protocol is used for a variety of functions in the e-mail server, such as resolving the numeric address [email protected], and which servers are blacklisted for being sources of Unsolicited Commercial Email (UCE)?

Part B:

1. What does an effective penetration test consist of?

2. Which is not part of the Attacker Kill Chain?
a. Reconnaissance
b. Exploitation
c. Weaponization
d. System Hardening

3. Time and dollar budgets permitting, it is beneficial to run more than one vulnerability scan because different vulnerability scanners may get different results. True or False?

4. It is important to rerun a vulnerability scan after patching programs or closing vulnerabilities because in closing some you may have opened others. True or False?

5. Domain Name Service runs on port ___.

6. Network 1, including the host connection for the firewall, is a part of the _________ Class C or CIDR /24 subnetwork.

Part C:

1. What firewall does Global Enterprises use?
2. What version of firewall did Global Enterprises install?
3. What is the current version number of the firewall software used by Global Enterprises?
4. What email server does Global Enterprises use?
5. What are Global Enterprises Domain Name Servers?
6. Which Global Enterprises employee used to work for the Los Angeles Police Department?
7. Where did LouAnneGarfinkle work before coming to Global Enterprises?
8. Job applicants often feel as if the job description were written especially for them, in LouAnne's case that was true. Briefly describe what elements of the job ad from Part 2 of the lab might appeal specifically to LouAnneGarfinkle.

9. What is the difference between social engineering and reverse social engineering?
a. Social engineering is used in the real world. Reverse social engineering is used in the cyber world.
b. Social engineering is used on most people. Reverse social engineering is used on people with specialized law enforcement training.
c. In social engineering the con artist goes to the target, in reverse social engineering the con artist gets the target to come to them.
d. In social engineering email is taken from the subject, in reverse social engineering the subject is sent email or SPAM.
e. Only script kiddies do social engineering, Reverse social engineering is done by professional cyber criminals.


10. What is the top objective of an anti-social engineering campaign within an organization?
a. Penalties
b. Awareness
c. Spying on co-workers
d. Spying on bosses
e. Spying on subordinates
f. All of c-e above

Part D:

1. What firewall does Global Enterprises use?
2. What version of firewall did Global Enterprises install?
3. What is the current version number of the firewall software used by Global Enterprises?
4. What email server does Global Enterprises use?
5. What are Global Enterprises Domain Name Servers?
6. Which Global Enterprises employee used to work for the Los Angeles Police Department?
7. Where did LouAnneGarfinkle work before coming to Global Enterprises?
8. Job applicants often feel as if the job description were written especially for them, in LouAnne's case that was true. Briefly describe what elements of the job ad from Part 2 of the lab might appeal specifically to LouAnneGarfinkle.
9. What is the difference between social engineering and reverse social engineering?
a. Social engineering is used in the real world. Reverse social engineering is used in the cyber world.
b. Social engineering is used on most people. Reverse social engineering is used on people with specialized law enforcement training.
c. In social engineering the con artist goes to the target, in reverse social engineering the con artist gets the target to come to them.
d. In social engineering email is taken from the subject, in reverse social engineering the subject is sent email or SPAM.
e. Only script kiddies do social engineering, Reverse social engineering is done by professional cyber criminals.

10. What is the top objective of an anti-social engineering campaign within an organization?
a. Penalties
b. Awareness
c. Spying on co-workers
d. Spying on bosses
e. Spying on subordinates
f. All of c-e above

Part E:

1. The traditional IPsec protocol stack that is installed with Openswan is ________. The new alternative is ________.

2. Which command displays the status of the IPsec installation?
3. Tunnels may either be established using manual mode or automatic mode. Which mode preferred?
4. The convention when drawing configuration diagrams of the VPN connection is to place the VPN server on the left or right (circle one), and the vWorkstation on the left or right (circle one). In this way, the left side of the diagram is usually reserved for the ________ machine, and the right side is usually the ________ machine.
5. Which of the following commands can be used to place a section break between sections when creating the ipsec.conf file?
a. A # character
b. A blank line
c. section=%break
d. SECTION-%break
e. None of the above
6. The klipsdebug and/or plutodebug should only be __________.
a. loaded in Openswan versions greater than 2.5.
b. enabled if specifically requested.
c. generated on systems with aggregate bandwidth greater than 100 Mbps.
d. used by Government Intelligence Agencies.
7. What is the name of the ipsec configuration file? In which directory is it stored?
8. Which of the following are valid options for the tunnel= command?
a. ESP, AH, null
b. Diffie-Hellman, OAKLEY, IKE
c. IKE and TINA
d. Tunnel, transport and passthrough
e. Tunnel, transport, *null*

Reference no: EM13755704

Questions Cloud

What was the consequence of the munich conference : What was the consequence of the Munich conference?
Write paper that compare missouri state and us constitution : Write a paper that compare and contrast the Missouri state constitution, the US constitution, and the constitution of the country for which you will write a Country Profile Report(Vietnam).
Create functions to simplify your code : Create functions to simplify your code. If you find yourself writing the same code over and over again, it should probably be made into a function.
What was the result of the dominion of new england : Describe and discuss the Dominion of New England. When was it created? Who created it? Why was it created? What was the result of the Dominion of New England?
File transfer protocol : The File Transfer Protocol (FTP) uses which transport protocol, TCP or UDP
Explain whether tarbo has a dominant strategy : Explain whether Wal-World has a dominant strategy and explain whether Tarbo has a dominant strategy.
Positive and negative impacts of pbuse information system : In this essay discuss both the positive and negative impacts of PBUSE information system has on the users within an organization and provide three recommendations for improving the information system
Which civilization was more impressive aztec or inca : Which civilization was more impressive, Aztec or Inca? Your essay should have a clear introduction with a strong thesis statement.
What search engine or database might you use and why : Describe what sort of search you would conduct to help you in responding to this student and why. What search engine(s) or database(s) might you use and why? What search terms? How would you go about evaluating the credibility of the information y..

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd