Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 1 In most cases, which of the following methods would you NOT want to u

ID: 3708517 • Letter: Q

Question

Question 1

In most cases, which of the following methods would you NOT want to use with an IDS

SPAN port

Network Tap

Network Hub

An unconfigured switch port   

Question 2

Host based security is not needed when you implement Defense in Depth.

True

False

Question 3

How could a corporate user with an unauthorized Wireless USB CDMA adapter from Verizon create a backdoor into the network?

CDMA broadcasts in plaintext.

Since it is easy to do, an attacker is likely to hack the CDMA signal and intercept wireless packets.

This would not create a backdoor since they are two separate networks.

This would inadvertently create a network bridge that could allow access to content behind the business's security controls.

SPAN port

Network Tap

Network Hub

An unconfigured switch port   

Explanation / Answer

SOLUTION:-

(1) An unconfigured switch port

Reason:- Becasue It will not allow access for all packets in order to monitoring by IDS.

(2) False

Reason:- Because Host based security is required when we implement Defence in Depth in order to prevent from the attack. It tells us about missing patches, security update, week settings of passwords and provides support in terms of infiltrate detection, content filter with antivirus software, enabling firewalls and VPN, services of penetrability management.

(3) Since it is easy to do, an attacker is likely to hack the CDMA signal and intercept wireless packets.

==================================================================================

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote