Network Security FAQ: Understanding Defenses

Network Security FAQ: Understanding Defenses

Q1. Standards for digital IDs and certificates are defined in which of the following documents?
a. RFC 509
b. CCITT X.509
c. RFC 905
d. CCITT X.905

Answer: b. The International Telecommunications Union (ITU-T), formerly known as CCITT, provides the CCITT X.509 standard for certificates.

Q2. List four parameters of a digital ID.

Answer: Parameters of a digital ID include version number, serial number, expiration date, and public key.

Q3. A host IDS can be embedded in a networking device, a standalone appliance, or a module monitoring the network traffic. True or False?

Answer: False. A host IDS is a server-specific agent that runs on a server.

Q4. Hardware keys are examples of which of the following?
a. Firewalls
b. PC cardbased solutions
c. Digital IDs
d. Biometrics

Answer: b. Hardware keys are examples of PC cardbased solutions.

Q5. What processes are covered in physical security policies?

Answer: Physical security policies cover internal and external security measures, disaster-recovery plans, and personnel training.

Q6. List two protocols that can be used for encrypted logins.

Answer: Secure Shell Protocol (SSH), Kerberos, Secure Socket Layer (SSL), and Transport Layer Security (TLS) can be used for encrypted logins.

Q7. Which three functional areas can be connected to a firewall?

Answer: The three functional areas that can be connected to a firewall are private networks, public networks, and the DMZ networks.

Q8. Which of the following are default PIX firewall interfaces?
a. Inside
b. Encrypted
c. Outside
d. Virtual private network (VPN)

Answer: a and c. The inside interface of the PIX is connected to a private or corporate intranet. The outside interface is typically connected to the Internet.

Q9. What is file encryption?

Answer: File encryption is a technique that can be used to protect and preserve the integrity of your data locally on your workstation by encrypting the files.

Q10. List four of the most common biometric technologies.

Answer: The most common biometric technologies are fingerprint scanning, voice recognition, face recognition, typing biometrics, and signature recognition.

About the author

Scott

Leave a Comment