Advances in technology occur too rapidly for security pros to keep up with them.
ID: 3851445 • Letter: A
Question
Advances in technology occur too rapidly for security pros to keep up with them.
Improvements in technology actually create the most security problems.
Technology cannot be effective if people do not follow appropriate procedures.
The author actually does say that technology solves network security problems.
HIsecdc, Hisecws, Websec, IPSec
DC security Securews, Rootsec, Supersec
Rootsec, Supersec Websec, IPSec
DC security, HIsecdc, Hisecws, Securews
ASP.NET
Administrator
IUSR_machine name
username
By reading the e-mail address book and mailing itself to everyone listed
By broadcasting ICMP packets and following network connections
By accessing the web application and cloning sent mail
By users downloading and installing unauthorized files from the Web
To manage popups and prevent nuisance advertising
To monitor a system, gain access to log on information, and allow access to from the outside
To monitor a system, gather information, and send it to a home system
To prevent others from detecting the presence of your computer on the network
Internet, leased lines, direct access, dial up
Tunneling, encryption, authentication, access control
Tunneling, dial up, authentication, Cisco, SNORT
Encryption, leased lines, ISP, piggy backing
ESP, IPComp, AH, IKE
Tunnel, Transport, IETF, MPPE
IPComp, AH, IETF, MPPE
AH, ESP, Tunnel, Transport
Modern math processors can break it quickly.
It divides data into 64-bit blocks. 64-bit systems are only recently becoming popular.
Because the key must be transmitted, the scheme is only as secure as your transport method.
Throughput is minimal, making it a poor choice for large files. For example, symmetric key encryption has no weaknesses.
AES
Blowfish
IDEA
PGP
Deflection and deterrence
Threshold and resource
Infiltration and preemptive blocking
Snort and Cisco intrusion detection
Explanation / Answer
Question: (TCO 9) Why does the textbook author state that technology alone is not a panacea for network security problems? (Points : 5)
Answer:
Advances in technology occur too rapidly for security pros to keep up with them.
Explanation:
Technology is evolving so the ways to breach network easily,so security flaws can be exploited more easily.
Question: (TCO 8) Which of the following security templates are included in Windows servers? (Points : 5)
Answer:
DC security, HIsecdc, Hisecws, Securews
Explanation:
Hisecdc.inf – This is used to increase the security and communications with the domain controllers.
Hisecws.inf – This is used to increase security and communications for the client computers and member servers.
DC security.inf – This is used to configure security of the Registry and File system of a computer that was upgraded from Windows NT to Windows 2000/2003.
Securews.inf – This is used to increase security and communications for the client computers and member servers
Question: (TCO 8) Which of the following would not be a default account on a Windows machine? (Points : 5)
Answer:
ASP.NET
Explanation:
ASP.net is a programing language not any windows user setup criteria.
Question: (TCO 7) Which of the following is the most common method by which viruses spread? (Points : 5)
Answer:
By users downloading and installing unauthorized files from the Web
Explanation:
Internet is filled with virus disguised as file, so downloading it from untrusted site can create a hazard for the PC.
Question: (TCO 7) What is the purpose of spyware? (Points : 5)
Answer:
To monitor a system, gain access to log on information, and allow access to from the outside
Explanation:
spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without their consent, or that asserts control over a device without the consumer's knowledge.
Question: (TCO 6) A good definition of VPNs is that they are a combination of which of the following? (Points : 5)
Answer:
Tunneling, dial up, authentication, Cisco, SNORT
Expalnation:
Tunneling: tunneling enables the encapsulation of a packet from one type of protocol to another protocol.
SNORT: it’s a network intrusion detection system thereby helping to keep vpn secured.
Cisco: network securirty can be implemented by secured cisco protocols.
Dial up: dial up connection can be used to create node to node vpn connection.
VPN solution uses Extensible Authentication Protocol (EAP) to provide secure authentication using both user name and password, and certificate-based methods.
Question: (TCO 6) Which protocols compromise IPSEC? (Points : 5)
Answer:
ESP, IPComp, AH, IKE
Explanation:
Internet Protocol Security (IPsec) is a network protocol suite that authenticates and encrypts the packets of data sent over a network.
IKE, Internet Key Exchange.
AH, IP Authentication Header.
ESP, Encapsulating Security Payload.
IPcomp, Ip payload compression protocol
Question: (TCO 5) which of the following statements is a weakness of symmetric encryption? (Points : 5)
Answer:
Because the key must be transmitted, the scheme is only as secure as your transport method.
Explanation:
The biggest problem with symmetric key encryption is that you need to have a way to get the key to the party with whom you are sharing data. So it depends on how secured your network is. If the network is not secured then the symmetric key can be hacked by someone.
Question: (TCO 5) Which of the following is a widely used public key system that is considered by many experts to be very secure and is available as a plug-in for MSN messenger and other communication software? (Points : 5)
Answer:
Blowfish
Explanation:
It’s the mostly used system as o effective cryptanalysis of it has been found to date, meaning no one is able to break the key to retireve the data.
Question: (TCO 4) What profiling types are used in anomaly detection? (Points : 5)
Answer:
Snort and Cisco intrusion detection
Expalanation:
These systems can be used to detect network anomaly easily.
Hope your question has been resolved. Do not forget to give a positive like to the answer. Thank you.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.