Network Security FAQ: Wireless Security Q1. List three categories of WLANs. Answer: Types of WLANs include peer-to-peer, LAN, and hotspots. Q2. Which IEEE standards define WLANs? a. IEEE 802.3 b. IEEE 802.5 c. IEEE 802.11 d. IEEE 802.10 Answer: c. IEEE 802.11 is the IEEE standard that defines WLANs. Q3. The IEEE 802.11 standard specifies the over-the-air interface … [Read more...]
Network Security FAQ: Remote Access
Network Security FAQ: Remote Access Q1. What does AAA stand for, and what is its function? Answer: AAA stands for authentication, authorization, and accounting and provides security to Cisco IOS routers and network devices. Q2. What is authentication used for? Answer: By requiring the user's username and password, authentication enables administrators to identify who can … [Read more...]
Network Security FAQ: Intrusion Detection System Concepts
Network Security FAQ: Intrusion Detection System Concepts Q1. List two weaknesses of the signature-based IDS. Answer: Weaknesses of the signature-based IDS include the following: High false positive rate Evasion susceptibility Single vulnerability may require multiple signatures Continuous updates required Cannot detect unknown attacks Q2. Why does … [Read more...]
Network Security FAQ: Firewalls
Network Security FAQ: Firewalls Q1. List three types of firewalls. Answer: Three firewall types include hardware, software, and personal. Q2. A TCP SYN flood attack is a form of DoS attack, which randomly opens up a number of TCP ports. True or False? Answer: True. Q3. List the three types of inspection methodologies. Answer: Three types of inspection methodologies are … [Read more...]
Network Security FAQ: Router Security
Network Security FAQ: Router Security Q1. Give two commands to configure an enable password on a router. Answer: Two commands to configure an enable password on a router are enable password and enable secret. Q2. Name three services that are running on a router that should be turned off if they are not used. Answer: Services that are running on a router that should be … [Read more...]
Network Security FAQ: Web Security
Network Security FAQ: Web Security Q1. What is the difference between a right and a permission? Answer: A right applies to actions that involve accessing the resources of the operating system itself, such as shutting down the system. A permission applies to accessing the file system's resources, such as reading and writing files. Q2. What can be done on a web server to make … [Read more...]
Network Security FAQ: Secure Design
Network Security FAQ: Secure Design Q1. ROI is calculated by dividing the ___ by the total ___. Answer: ROI is calculated by dividing the profit (return) by the total investment cost. Q2. What are the four general categories of constraints encountered by a network designer? Answer: Technological, political, social, and economical constraints affect network design. Q3. What … [Read more...]
Network Security FAQ: Security Policies
Network Security FAQ: Security Policies Q1. What is the difference between a closed network and an open network? Answer: A closed network is typically designed and implemented in a corporate environment. A closed network provides connectivity only to known parties and sites without connection to public networks. In contrast, an open network is designed with availability to … [Read more...]
Network Security FAQ: Cryptography
Network Security FAQ: Cryptography Q1. How many possible keys are there for an 8-bit key? a. 8 b. 82 c. 28 d. 65,536 Answer: c. There are 8 bits in that key, and all those bits can have two different values. To calculate the possible keys, multiply 2 by 2 by 2one time for every bit, or 28. Q2. Which type of cipher typically acts on small units of data? a. Block … [Read more...]
Network Security FAQ: Understanding Defenses
Network Security FAQ: Understanding Defenses Q1. Standards for digital IDs and certificates are defined in which of the following documents? a. RFC 509 b. CCITT X.509 c. RFC 905 d. CCITT X.905 Answer: b. The International Telecommunications Union (ITU-T), formerly known as CCITT, provides the CCITT X.509 standard for certificates. Q2. List four parameters of a digital … [Read more...]