1.
You are configuring your new IDS machine, where you have recently installed Snort. While you are working with this machine, you wish to create some basic rules to test the ability to log traffic as you desire. Which of the following Snort rules will log any tcp traffic from any host other than 172.16.40.50 using any port, to any host in the 10.0.10.0/24 network using any port?
2.
You are configuring a new IDS, running Snort, in your network. To better configure Snort, you are studying the configuration file. Which four of the following are the primary parts of the Snort configuration file?
3.
If you wish to create a new rule in ISA Server 2006 so that all file attachments with an .exe extension that come through the firewall are dropped, what would you select in the Toolbox to create this rule?
4.
Your network traffic has increased substantially over the last year, and you are looking into your caching options for frequently visited websites. What are the two types of caching that ISA Server 2006 supports?
5.
You are considering your options for a new firewall deployment. At which three layers of the OSI model does a stateful packet filtering firewall operate?
6.
As you increase the layers of security in your organization, you must watch the network behavior closely. How can a firewall have a negative impact on the performance of your network?
7.
The CEO of your company has just issued a statement that the network must be more secure right away. You have discussed several options with the Chief Security Officer and the Chief Technology Officer. The results of your discussion are to implement IPSec. What are the two prime functions of IPSec that you can let the CEO know will be addressed with the implementation?
8.
As per the specifications of RFC 1191: Path MTU Discovery, MTUs have been defined so that transmitted datagram will not unnecessarily become fragmented when traveling across different types of physical media. You are going to run several packet captures to be sure there are no out of spec packets on your network. According to these specifications what are the absolute minimum and maximum MTUs?
9.
In the image, there are two nodes communicating directly, without an access point. In the packet on the right side of the image, the Address 1 field is blank. If this packet is going to the other computer, what is the value that must be filled in this blank address field?
10.
During a training presentation, that you are delivering, you are asked how wireless networks function, compared to the OSI Model. What two layers of the OSI Model are addressed by the 802.11 standards?