1.
In your office, you are building the new wireless network, and you will need to install several access points. What do wireless access points use to counter multipath interference?
2.
Your network is going to implement a new IPSec solution. Which of the following IPSec components is used to define the security environment in which the two hosts communicate?
3.
You are configuring your new IDS machine, where you have recently installed Snort. While you are working with this machine, you wish to create some basic rules to test the ability to log traffic as you desire. Which of the following Snort rules will log any telnet traffic from any IP address to port 23 of the 10.0.10.0/24 network?
4.
Your company has created it's security policy and it's time to get the firewall in place. Your group is trying to decide whether to build a firewall or buy one. What are some of the benefits to purchasing a firewall rather than building one?
5.
You need to diagram wireless security options for your team during a planning meeting. What wireless security process is shown in this image?
6.
The main reason you have been hired at a company is to bring the network security of the organization up to current standards. A high priority is to have a full security audit of the network as soon as possible. You have chosen an Independent Audit and are describing it to your coworkers. Which of the following best describes an Independent audit?
7.
You are going to configure your SuSe Linux machine to run Snort, as the IDS in your network. In order to take full advantage of Snort, you have read that you need a LAMP Server. What are the components of a LAMP Server?
8.
You are configuring your new IDS machine, where you have recently installed Snort. While you are working
with this machine, you wish to create some basic rules to test the ability to log traffic as you desire. Which
of the following Snort rules will log any tcp traffic from any IP address to any port between 1 and 1024 on
any host in the 10.0.10.0/24 network?
9.
You are configuring the IP addressing for your network. One of the subnets has been defined with addresses already. You run ifconfig on a host and determine that it has an address of 10.12.32.18/14. What is the broadcast address for this network?
10.
In the image, there are two nodes communicating via two access points that are bridging together two segments. In the middle packet, under the left access point, the Address 4: field is blank. If this packet is destined for the computer on the right side of the image, what must be the value of Address field 4 in this middle packet?