1.
If you are physically examining the office where your WLAN is configured, what are you performing?
2.
If you configure an access-list to block the following networks, what are you trying to protect against? Network 127.0.0.0/8, Network 0.0.0.0/0 Network 10.0.0.0/8 Network 172.16.0.0/16, and Network 192.168.0.0/16.
3.
You are configuring your new IDS machine, where you have recently installed Snort. While you are working with this machine, you wish to create some basic rules to test the ability to log traffic as you desire. Which of the following Snort rules will log any tcp traffic from any IP address to any port between 1 and 1024 on any host in the 10.0.10.0/24 network?
4.
You have used a diagnostic utility to run a trace between two nodes on your network. During the trace, you are running a packet capture utility and notice the TTL is reaching zero on the trace. What will the router that identified the TTL as zero return to the host that originated the trace command?
5.
You have recently taken over the security of a mid-sized network. You are reviewing the current configuration of the IPTables firewall, and notice the following rule: ipchains -A input -p TCP -s 0.0.0.0/0 -d 10.0.10.0/24 5000:10000 -j DENY What is the function of this rule?
6.
You have just installed a new ISA Server 2006, and are monitoring the new deployment. In the Monitoring Details pane, which tab will provide you with visual displays of current monitoring information?
7.
If you capture an 802.11 frame, and the ToDS bit is set to zero and the FromDS bit is set to zero, what type of WLAN is this frame a part of?
8.
In the image, there are two nodes communicating via two access points that are bridging together two segments. In the middle packet, under the left access point, the Address 4: field is blank. If this packet is destined for the computer on the right side of the image, what must be the value of Address field 4 in this middle packet?
9.
ISA Server 2006 features extensive rule matching abilities. Which of the following lists has the proper order for howISA Server 2006 checks rule elements that make up an Access rule?
10.
You are introducing a co-worker to the security systems in place in your organization. During the discussion you begin talking about the network, and how it is implemented. You decide to run a packet capture to identify different aspects of network traffic for your co- worker. In the packet capture you are able to identify Protocol IDs. What is the IP protocol ID for TCP?