SOLUTIONS
Acme Inc. has hired you to implement security solutions as
recommended by the findings of a network security audit. Currently, any
station plugged into a switch can communicate on the network without
any type of authentication. Acme Inc. would like to limit network
communications by connecting stations until they have been
authenticated. What should you implement? - Precise Answer
✔✔802.1x
Your IT security director asks you to configure packet encryption for
your internal network. She expresses concerns about how existing
packet filtering firewall rules might affect this encrypted traffic. How
would you respond to her concerns? - Precise Answer ✔✔Encrypted
packet headers could prevent outbound traffic from leaving the internal
network.
You are reviewing router configurations to ensure they comply with
corporate security policies. You notice the routers are configured to load
their configurations using TFTP and also that TCP port 22 is enabled.
What security problem exists with these routers? - Precise Answer
✔✔TFTP is an insecure protocol.
Which network device encrypts and decrypts network traffic over an
unsafe network to allow access to private LANs? - Precise Answer
✔✔VPN concentrator
, You are configuring inbound firewall rules on a Linux host. Which
command-line tool would you use? - Precise Answer ✔✔iptables
What term describes the network between the two firewalls, shown
here? - Precise Answer ✔✔DMZ
An attacker sends thousands of TCP SYN packets with unreachable
source IP addresses to a server. After consuming server resources with
this traffic, legitimate traffic can no longer reach the server. What can
prevent this type of attack? - Precise Answer ✔✔SYN flood protection
Acme Inc. has hired you to implement security solutions as
recommended by the findings of a network security audit. Stations used
by Accounting staff should not be able to communicate with other
stations on the network. What should you implement? - Precise Answer
✔✔VLAN
What will detect network or host intrusions and take actions to prevent
the intrusion from succeeding? - Precise Answer ✔✔IPS
You are a guest at a hotel offering free Wi-Fi Internet access to guests.
You connect to the wireless network at full signal strength and obtain a
valid TCP/IP configuration. When you try to access Internet web sites, a
web page displays instead asking for a code before allowing access to
the Internet. What type of network component is involved in providing
this functionality? - Precise Answer ✔✔Proxy server