1.
You have been hired at a large company to manage network security issues. Prior to your arrival, there was no one dedicated to security, so you are starting at the beginning. You hold a meeting and are discussing the main functions and features of network security. One of your assistants asks what the function of Confidentiality in network security is. Which of the following best describes Confidentiality?
2.
If you configure an access-list to block the following networks, what are you trying to protect against? Network 127.0.0.0/8, Network 0.0.0.0/0 Network 10.0.0.0/8 Network 172.16.0.0/16, and Network 192.168.0.0/16.
3.
Which of the following is a potential weakness of a commercial firewall product that is installed on a hardened machine?
4.
If you are physically examining the office where your WLAN is configured, what are you performing?
5.
You are configuring your new IDS machine, and are creating new rules. You enter the following rule: Alert tcp any any - > any 23 (msg: "Telnet Connection Attempt";) What is the effect of this rule?
6.
You are the firewall administrator at your company and the network administrators have decided to implement a PPTP VPN solution, which of these ports would you need to allow through the firewall to allow these VPN sessions into your network?
7.
You have been hired at a large company to manage network security issues. Prior to your arrival, there was no one dedicated to security, so you are starting at the beginning. You hold a meeting and are discussing the main functions and features of network security. One of your assistants asks what the function of Authentication in network security is. Which of the following best describes Authentication?
8.
You have been working with Snort, on your Windows Server 2003, for some time as a packet capture tool, and now wish to connect Snort to a database on your server. You install MySQL as the database, and are
ready to configure Snort. If the database is named: snortdb1, has a user name of: snort, and a password of: snortpass, what is the configuration line you need to add to Snort?
9.
In order to perform promiscuous mode captures using the Wireshark capture tool on a Windows Server 2003 machine, what must first be installed?
10.
You have recently been contracted to implement a new firewall solution at a client site. What are the two basic forms of firewall implementations?