logo image

Section 6

You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do?
Implement version 3 of SNMP
You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. What protocol should you implement?
Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
You are configuring a network firewall to allow SMTP outbound email traffic, and POP3 inbound email traffic. Which of the following TCP/IP ports should you open on the firewall? (Select Two)
25, 110
Which port number is used by SNMP?
Which of the following ports does FTP use to establish sessions and manage traffic?
20, 21
Using the Netstat command you notice that a remote system has made a connection to your Windows server 2003 system using TCP/IP port 21. Which of the following actions is the remote system most likely to be performing ?
Downloading a file
To increase security on your company’s internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform some secure credit card transactions.
Which of the following network services or protocols uses TCP/IP port 22?
Matching ports to associated services
SNMP = 161 TCP and UDP
SSH = 22 TCP and UDP
SCP = 22 TCp and UDP
Telnet = 23 TCP
HTTPS = 443 TCP and UDP
FTP = 20 TCP
POP3 = 110 TCP
Which of the following lists accurately describes TCP and UDP?
TCP: connection-oriented, reliable, sequenced, high overhead
UDP: connectionless, unreliable, unsequenced, low overhead
You are an application developer creating applications for a wide variety of customers. In which two of the following situations would you select a connectionless protocol?(Select 2)
A gaming company wants to create a networded version fo its latest game
A company connects two networks through an expensive WAN link. The communication media is reliable, but very expensive. They want to minimize connection times.
You want to maintain tight security on your internal network so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable?
Your company’s network provides HTTP, HTTPS, and SSH access to remote employees. Which ports must be opened on the firewall to allow this traffic to pass?
80, 443, 22
Your network recently experienced a series of attacks at the Telnet and FTP services. You have rewritten the security policy to abolish the unsecured services, and now you must secure the network using your firewall and routers. Which ports must be closed to prevent traffic directed to these two services?
23, 21
Which of the following best describes the purpose of using subnets?
Subnets divide an IP address into multiple addresses.
Which of the following is NOT a reason to use subnets of a network?
Combine different media type on the same subnet.
Which of the following IPv6 addresses is the equivalent of IPv4 loop-back address of
Which of the following describes an IPv6 address? (select two)
128-bit address; eight hexadecimal quartets
Which of the following correctly describe the most common format for expressing IPv6 addresses? (select two)
Hexadecimal numbers; 32 nubmers, grouped using colons
Which of the following are valid IPv6 addresses? (select two)
AND 141:0:0:0:15:0:0:1
Which of the following is a valid IPv6 address?
Routers operate at which level of the OSI model?
Network layer OR layer 3
You’ve decided to use a subnet mask of on the network to create four separate subnets. Which network IDs will be assigned to these subnets in this configuration? (selec two)
172.17/128.0 AND
Which of the following is the best countermeasure against man-in-the-middle
What is modified in the most common form of spoofing on a typical IP packet?
Source address
Which type of Denial of Service (DoS) attack occurs when a name server receives malicious or
misleading data that incorrectly maps host names and IP addresses?
DNS poisoning
Which of the following describes a man-in-the-middle
A false server intercepts communications from a client by impersonating the intended
Capturing packets as they travel from one host to another with the intent of altering the contents
of the packets is a form of which security concern?
Man-in-the-middle attack
When the TCP/IP session state is manipulated so that a third party is able to insert alternate
packets into the communication stream, what type of attack has occurred?
What is the goal of a TCP/IP hijacking attack?
Executing commands or accessing resources on a system the attacker does not
otherwise have authorization to access
Which of the following is not a protection against session hijacking?
DHCP reservations
Which of the following is the most effective protection against IP packet spoofing on a private
Ingress and egress filters
While using the Internet, you type the URL of one of your favorite sites in the browser. Instead
of going to the correct site, however, the browser displays a completely different website. When
you use the IP address of the Web server, the correct site is displayed.
Which type of attack has likely occurred?
DNS poisoning.
Which of the following attacks tries to associate an incorrect MAC address with a known IP
ARP poisoning
What are the most common network traffic packets captured and used in a replay attack?
When a malicious user captures authentication traffic and replays it against the network later,
what is the security problem you are most concerned about?
An unauthorized user gaining access to sensitive resources
A router on the border of your network detects a packet with a source address that is from an
internal client but the packet was received on the Internetfacing
interface. This is an example of
what form of attack?
An attacker uses an exploit to push a modified hosts file to client systems. This hosts file
redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and
financial information.
What kind of exploit has been used in this scenario? (Choose two. Both responses are different
names for the same exploit.)
DNS poisoning

Need essay sample on "Section 6"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
Complete Buyer Protection
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy