How did the computer find this web server''s ip address

Assignment Help Computer Networking
Reference no: EM13947743

There are 10 multiple choice questions regarding basic network security. I had answered what I thought would be the correct answers. If I am incorrect, please offer the correct answer along with your comments as to why your answers are correct.

1. Why are computer networks so difficult to secure?

a. User Anonymity

b. Networks are complex, dynamic, and difficult to understand and verify

c. There are many points of attack, making it difficult to completely secur

d. All of the above

My answer is all of the above

2. Which of the following are shortcomings of most intrusion detection systems?

a. Their effectiveness is based upon where you put them in your network.

b. Too may false alarms can cause an operator to disbelieve bona fide attacks.

c. They need to be continually updated to recognize the latest attacks.

d. They are limited in their ability to detect intrusive activity within encrypted data packets/sessions.

e. All of the above

My anser is C.

3. An intrusion detection sensor and "sniffer" have this in common.

a. They evesdrop on all network data looking for patterns of interest

b. It is difficult to detect that either is running somewhere on the network

c. They collect and store network information

d. All of the above

e. None of the above

My Answer is A but I am not sure

4. I used my firewall rule table to filter out (deny) IP addresses of "bad guys". Am I safe?

a. Yes, because I can accurately determine the packet sender from the IP address

b. No, because the attacker can put a fictitious source IP his/her packet.

c. Not necessarily, because the attacker may use micro-fragmentation to prevent the firewall from assembling the entire packet and reading the important TCP/UDP port information.

d. All but (A)

5. My answer is C

When placing VPN hardware on your corporate network to harness the Internet, you should consider placing it:

a. Just inside of your wireless access point

b. It depends on the operational needs and security model of your company.

c. Just outside of your corporate firewall

d. So that your network intrusion detection system can only see encrypted packets transmitted by the VPN hardware.

I am not sure what a VPN is actually...

6. My company is located in three geographical locations and is connected via the Internet. I purchase one Class C network and then assign contiguous blocks of IP addresses (subnets) to each location. The Internet has the capability to route between my locations. Twenty years ago, this would not have been possible. This is possible mostly due to the introduction of:

a. TCP

b. Classless Internet Domain Routing (CIDR)

c. Encryption

d. Firewalls

My answer would be d however I am confusing it with TCP.

7. The process of adding headers and trailers to an application data packet prior to transport over a network is called:

a. Encapsulation

b. Sequencing

c. Fragmentation

d. Complication

My answer would be a.

8.To securely encrypt data between company branch offices, using the public Internet as the communication network, I would use:

a. QoS Encryption

b. Link Encryption

c. A VPN

d. A firewall

My guess would be d.

9.I entered 'www.cybercrime.com' in my web browser and the web site comes up on my computer. How did the computer find this web server's IP address?

a. Domain Name Services (DNS)

b. Address Resolution Protocol (ARP)

c. Border Gateway Protocol (BGP)

d. Dynamic Host Configuration Protocol (DHCP)

My answer would be a.

10.Computers really communicate using their hardware (MAC) addresses. What service performs the translation between a computer's MAC and IP addresses?

a. Domain Name Services (DNS)

b. Border Gateway Protocol (BGP)

c. Dynamic Host Configuration Protocol (DHCP)

d. Address Resolution Protocol (ARP)

My answer would be b but I am confusing this with a.

Reference no: EM13947743

Questions Cloud

Implement effective procurement and supply : The opportunities for the procurement and supply function to create savings or efficiencies or other sources of added value and how the profile of the function can be improved
What the command does, how it could be used : Examples I can use in a UNIX machine
What is the variance of the first component : Display the loadings of the first two components. Explain clearly what they tell you about the relationship between the original variables (X1 to X6) and the first two components.
Compute basic and diluted eps : Assume the same facts as for part 1), except that the 60 bonds were issued on September 1, 20x1 (rather than 20x0), and none of them was converted. Compute basic and diluted EPS for 20x1.
How did the computer find this web server''s ip address : I entered 'www.cybercrime.com' in my web browser and the web site comes up on my computer. How did the computer find this web server's IP address?
What is the margin of error in this confidence interval : Determine a 95% confidence interval for the mean battery lifetime assuming the population standard deviation is not known. Interpret it. What is the margin of error in this confidence interval?
What is the dark side of self esteem : What is the dark side of self-esteem? What impact does low self-esteem have on behavior?
How much safety stock does the company carry : Compute the reorder point assuming that safety stock is carried by Quadrex. How much safety stock does the company carry?
Compute the oxygen evaporation rate : Moisture in the ambient air will result in frost forma- tion on the container, causing the surface emissivity to  increase.  Assuming  the surface  temperature  and convection   coefficient   to   remain   at   -10°C   and 10 W/m2 · K, respectivel..

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd