What is the major advantage of a dedicated firewall device

Assignment Help Computer Network Security
Reference no: EM132078270

NETWORK AND INTERNET SECURITY

PROBLEM 1 - Network Access Control

a) An organization decided to implement an education program using role-based training, and wants to ensure that each role gets the necessary training based on the role. Which of the following best describes the responsibilities of data owners and indicates what training they need?
A) Ensuring data is backed up in accordance with the data policy.
B) Ensuring data is classified and labeled correctly.
C) Complying with laws related to privacy.
D) Understanding common threats, such as malware and phishing attacks.

b) Separation of duties (SoD) is a key concept of internal controls. Indicate two best answers from the following list that are elements of SoD.
A) Individuals rotate security-related duties so that no one person is permanently responsible for a sensitive function.
B) Includes two-man and dual operator controls.
C) Operators maintain an arms-length relationship with security controls.
D) Continuous retraining of personnel.
E) Ensures that no one person can compromise the whole system.

c) Which of the following is assumed when there is a deviation from the security policy of an organization?
A) Risk Assignment
B) Risk Containment
C) Risk Acceptance
D) Risk Reduction

d) In setting up a compliance program, a NAC system has several functions. Which ones are the most important?
A) Policies, authentication and access control
B) Authentication, access control and remediation
C) Authentication, access control and audit
D) Policies, remediation and audit

PROBLEM 2 - IPSec and VPN

a) You have to deploy a VPN where all remote users must use IPSec to connect to the VPN gateway but no internal hosts should use IPSec. Which of the following modes should be used?
A) host-to-host
B) host-to-gateway
C) gateway-to-gateway
D) This configuration cannot be deployed.

b) Which of the following is the simplest and most usable function of SSL VPN?
A) Application translation
B) Port forwarding
C) Proxy
D) Network extension

c) Which of the following describes the relationship between an extranet and a VPN?
A) Some extranets are VPNs; some VPNs are extranets.
B) Some extranets are VPNs; all VPNs are extranets.
C) Extranets and VPNs are the same type of network.
D) Extranets are unrelated to VPNs.

d) A company has a large number of remote workers, including traveling salespeople. Which type of VPN would be best for connecting to the company's network in a secure manner?
A) L2TP VPN.
B) IPSec VPN.
C) Site-to-Site VPN.
D) Remote-access VPN.

PROBLEM 3 - Firewalls

a) A company would like to provide for its customers Internet access in their lounge area via an unsecured wireless network. However, customers should not have access to the internal network resources of the company. Which of the following firewall rules would BEST accomplish this?
A) Block traffic from the wireless access point.
B) Content filtering on the wireless access point.
C) Packet filtering on the wireless access point.
D) Allow traffic from the wireless access point.

b) What is the major advantage of a dedicated firewall device when throughput and security are the main objectives?
A) The management console is easily installed.
B) The device contains proprietary operating systems.
C) The connection to the device is monitored by security personnel.
D) A thorough packet inspection capability.
E) The hackers know most router-based firewall code.

c) Which type of network security device was incapable of discriminating between packets originating on the internal network vs. the external network?
A) Stateful Firewall.
B) Packet Filter.
C) Stateless Firewall.
D) IDS - Intrusion Detection System.
E) None of the above

d) Which answer best describes a device that sits between your users and the internet and rewrites source ports and source IP Addresses and enhances your security posture?
A) Network Address Translator.
B) Web Proxy.
C) Web Firewall.
D) Host based firewall.

PROBLEM 4 - Wireless Network Security

a) What is the protocol developed for the wireless network communications?
A) Wireless Encryption Protocol (WEP)
B) Wireless Application Protocol (WAP)
C) Wired Equivalent Privacy (WEP)
D) Wireless Session Protocol (WSP)

b) Which of the following vulnerabilities is unique to 802.11 wireless LANs?
A) Forged deauthenticate frames
B) RF jamming
C) TCP SYN floods
D) Data sniffing

c) Your job is to configure all wireless access points to make use of a new network certificate authority. Which of the following should be used?
A) WEP
B) LEAP
C) EAP-TLS
D) TKIP

d) In order to gain access to a wireless network, an attacker intercepted the authentication traffic. What type of attack is this?
A) IV attack
B) Replay attack
C) Near field communication
D) Evil twin

PROBLEM 5 - Web and Transport Layer Security

a) The role of SSL is to _________
A) encrypt specific elements of data for application-specific purposes.
B) encrypt files located on a Web server.
C) encrypt data as it travels over a network.
D) encrypt digital certificates used to authenticate a Web site.
E) encrypt passwords for storage in a database.

b) A central hospital suffered recently a serious attack. The attackers notified that they encrypted a significant amount of data on the hospital's servers and it would remain encrypted until a substantial sum is paid. Which of the following identifies the most likely threat actor in this attack?
A) Organized crime
B) Ransomware
C) Competitors
D) Hacktivist

c) A database application on your company's database server has been repeatedly reported crashing. The detailed debugging logs revealed that just prior to crashing, the application is receiving a long series of x90 characters. This is an example of which of the following?
A) SQL injection
B) XML injection
C) Zero-day
D) Buffer overflow

d) The IDS of a company detected that the company website is under attack. The web logs show the following string, INSERT INTO message `<script>source=https://malicioussite</script>, indicating that someone is trying to post a comment on a public bulletin board. What type of attack is this?
A) SQL injection attack
B) XML injection attack
C) XSS attack
D) Buffer overflow attack

Verified Expert

This work is about the MCQ which are related to firewall, wireless device, VPN and other security related work. I have proved the answer with sort description of each.

Reference no: EM132078270

Questions Cloud

How does robot security devices allow effective security : How does robot security devices allow effective and safer security in dangerous areas? In proper APA format, write a minimum of 2 paragraphs.
Write about the physical security in detail : Write 250 words on physical security and 250 words on telecommunications network security related to work experience. How do we use them in our work environment
Emergency medical treatment and active labor act : The Emergency Medical Treatment and Active Labor Act (EMTALA) mandates that individuals cannot be refused medical treatment from a hospital for the inability
What you would recommend as an alternative tool : BUS519 Review the Monte Carlo Analysis method presented in Chapter 15 of the Hillson and Simon text. Then, determine whether or not you would recommend.
What is the major advantage of a dedicated firewall device : INFA 620 NETWORK AND INTERNET SECURITY - University of Maryland - What is the major advantage of a dedicated firewall device when throughput and security
Patton-fuller community hospital virtual organization : Imagine your learning team is the human resources management team at the Patton-Fuller Community Hospital virtual organization
What is the current ratio : What is the current ratio for the following data? Cash - $34,000; marketable securities - $16,000; accounts and notes receivable, net - $46,000
Identify the required pre-workshop activities : Identify the required pre-workshop activities. Prepare a risk workshop agenda based on Figure B-8, Sample Agenda for a First Risk Assessment.
Anlayse the rules of statutory interpretation : You must write an answer to the problem-type question below, using the ILAC (Issues, Law, Application, Conclusion) format

Reviews

inf2078270

11/3/2018 3:26:49 AM

Thanks The solution you have provided is very good. I sent my wishes to the expert when I received the solution from your team but now I have received the grading as well. I am very much impressed with the work. This is worth buying the assignment. thanks once more.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd