1.
You are configuring a new IDS, running Snort, in your network. To better configure Snort, you are studying the configuration file. Which four of the following are the primary parts of the Snort configuration file?
2.
You have been given the task of adding some new wireless equipment to the existing wireless network in your office. What wireless standard allows for up to 54 Mbps transmission rates and is compatible with 802.11b?
3.
You have just installed a new IDS and are creating the analysis options. Since you wish for your options to be based on time, which of the following will be able to meet your analysis needs?
4.
You are installing a new firewall and your CEO asks what the benefits will be to the organization. Which of the following are benefits to implementing a firewall?
5.
You are considering your options for a new firewall deployment. At which two layers of the OSI model does a simple (stateless) packet filtering firewall operate?
6.
You are the firewall administrator for your company and you have just learned that the Server administrators are gearing up support an L2TP based VPN solution. You are told to be sure that your firewall rule sets will not hinder the performance of the VPN. Which port, from the following list, will you have to allow through the firewall?
7.
You have just found a user who has performed an improper utilization of resources inside the organization both intentionally and unintentionally. This user has just provided you with a working example of which of the following?
8.
One of the firewall choices you are thinking of implementing, in your network, is a proxy server. A proxy server can accomplish which of the following statements?
9.
You have just installed a new firewall and explained the benefits to your CEO. Next you are asked what some of the limitations of the firewall are. Which of the following are issues where a firewall cannot help to secure the network?
10.
In the command ipchains -N chain , what will the -N accomplish in the chain?