Describe the purpose of firewalls

Assignment Help Computer Networking
Reference no: EM13726796

Part 1:(true/ false)

1) Deep packet inspection firewalls protect networks by blocking packets based on the packets' header information at the network (IP) layer. Answer: _____ If F, why?

2) Employers have the right (and in some cases the obligation) to see any information stored, transmitted, or communicated within the employer's environment. This legal right is the basis for monitoring (or at least explicitly stating the right to monitor) email, network traffic, voice, wireless, and other communications. Answer: _____

3) Intrusion Detection Systems (IDS) provide no protection from internal threats. Answer: _____

4) A Denial-of-Service attack does not require the attacker to penetrate the target's security defenses. Answer: _____

5) Security awareness, training, and education programs are key components of organizational risk management strategies.
Answer: _____

Part 2: Multiple Choice Questions. Print the correct answer in the blank following the question.

1. Match the following TCP/IP protocol layer with its function (select a., b., c., or d. below):

A. Network 1. Coordinates communication between applications.

B. Physical 2. Supports useful functions over the transport layer such identity/location of applications.

C. Application 3. Moves information between hosts that are not directly connected.

D. Transport 4. Moves bits between the nodes in the network.

a. A--->3; B--->4; C--->2; D--->1

b. A--->2; B--->4; C--->1; D--->4

c. A--->2; B--->3; C--->4; D--->1

d. A--->3; B--->4; C--->1; D--->2


Answer: _____________

2. Protection of a software program that uses a unique, novel algorithm could legally be protected by:

a. A patent
b. A copyright
c. A trademark
d. Ethical standards

Answer: _____

3. Security threats include which of the following:

a. Unlocked doors
b. Disgruntled employees
c. Hurricanes
d. Un-patched software programs
e. All of the above

Answer: _____

4. Denial of service attacks include (select one or more):

a. Buffer overflow attack
b. Smurf attack
c. Ping flood attack
d. SYN flood attack
e. All of the above

Answer: _____

5. A disgruntled employee creates a utility for purging old emails from the server. Inside the utility is code that that will erase the server's hard drive contents on January 1st, 2016. This is an example of which of the following attacks?

a. Virus
b. Logic Bomb
c. Spoofing
d. Trojan horse
e. Botnet
f. Rootkit
g. Backdoor

Answer: _____

6. Mary is the cofounder of Acme Widgets, a manufacturing firm. Together with her partner, Joe, she has developed a special oil that will dramatically improve the widget manufacturing process. Mary and Joe plan to make large quantities of the oil by themselves in the plant after the other workers have left to keep the formula secret. They would like to protect this formula for as long as possible. What type of intellectual property protection best suits their needs?

a. Copyright
b. Trademark
c. Patent
d. Trade Secret

Answer: _______

7. You should clear cookies in your browser periodically because:

a. They (Cookies) can be used to track your web browsing behavior and invade your privacy.
b. They can facilitate impersonation attacks.
c. They can be used to spread viruses.
d. a. & b.
e. b. & c.
f. a., b. & c.

Answer: _________

8. A TCP/IP session hijacking can be best described as:

a. Providing false identity information to gain unauthorized access
b. Establishing a connection without specifying a username or password
c. An attacker takes control of a session between the server and a client
d. Flooding the connection with too many requests

Answer: _________

9. Tracker attacks in databases get around:

a. Anonymization

b. Data transformation

c. Query size restriction

d. Data partitioning

Answer: _________

10. A race condition attack can result in:

a. A symbolic link
b. Object orientation
c. A deadlock
d. Access to low address memory locations

Answer: __________

11. __________ is when the data in the SDB can be modified so as to produce statistics that cannot be used to infer values for individual record resource.

a. Data perturbation

b. Database access control

c. Inference channeling

d. Output perturbation

Answer: _________

12. With __________ the records in the database are clustered into a number of mutually exclusive groups and the user may only query the statistical properties of each group as a whole.

a. compromise

b. inference

c. partitioning

d. query restriction

Answer: ________

13. A web session (i.e., a session between a web browser and a web server) can be protected against the risk of eavesdropping in an economical and convenient manner through the use of which of the following?

a. IPSec

b. HTTP over SSL

c. Link encryption

d. Microsoft Encrypting File System (EFS)

Answer: ______

 

14. While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access one of your internal application servers. Although it appears that the user's attempts were unsuccessful, you are still very concerned about the possibility that your systems may be compromised. Which of the following solutions are you most likely to implement?


a. A firewall system at the connection point to the Internet

b. An improved RBAC-based access control system for the application servers

c. File-level encryption

d. Kerberos authentication

Answer: _______

15. What specific policy might most likely recommend removing a server from the network and re-installing all software and data?

a. A privacy policy
b. An authentication policy
c. An incident response policy
d. Wireless network access policy

Answer: ________

16. The security risk of allowing dynamic content ( to execute) on a target machine is:

a. The time delay from when it is downloaded and executed could make the browser experience not very satisfying.

b. Malware may be included in the downloaded code and infect the target machine.

c. The mobile code author may never be known.

d. None of the above.

Answer: _______

17. Encrypting a message with a private key (of the sender) in an asymmetric system provides:

a. Proof of receipt
b. Confidentiality
c. Proof of origin
d. Message availability
Answer:_______

18. The correct ordering of the upper layers of the OSI model are:

a. Session, application, presentation
b. Session, presentation, application
c. Session, application, presentation, physical
d. Application, presentation, session, network

Answer: _______

19. In relational database parlance, the basic building block is a __________, which is a flat table.

a. attribute
b. tuple
c. primary key
d. relation
e. field

Answer: _____

20. Routers operate at the _____________ of the OSI stack?
a. Transport
b. Application
c. Session
d. Network
e. Data Link

Answer: _____

21. Gateways operate at the _____________ of the OSI stack?
a. Transport
b. Application
c. Session
d. Network
e. Data Link

Answer: _____

22. Which e-mail security protocol(s) depend(s) upon a "Web of Trust"?
a. Kerberos
b. Public Key Infrastructure (PKI)
c. Secure Sockets Layer (SSL)
d. Transport Layer Security (TLS)
e. Pretty Good Privacy (PGP)
f. Secure Multipurpose Internet Mail Extensions (S/MIME)
g. Privacy Enhanced Mail (PEM)
h. Data Link

Answer: _____

Part 3: Short Answer Questions.
Briefly describe the purpose of firewalls and how they work, including two fundamental approaches to creating firewall policies and types of firewalls
There are many threats associated with e-mail. List those threats and describe a mitigation strategy for each.

Part 4: Essay Question. (Maximum length: one and half page, single-spaced including at least 3 references; 20 points)

While sitting in the break room at work one day, Stan is talking with his friend Joe, who is excitedly describing an idea for a new intrusion detection system (IDS). Joe describes an elegant new algorithm that will flawlessly detect intrusion attacks and respond almost instantly. Stan, who is more of an entrepreneur than inventor, quickly grasps the essence of Joe's idea, and decides to incorporate the idea into a commercial product, without the knowledge or participation of Joe. In his scheme to commercialize Joe's idea, Stan plans to hire a programmer to implement Joe's algorithm, and use the software to control a novel new hardware component. Stan would like to protect the intellectual property of the algorithm, software, and hardware component, but is experiencing some guilt pangs. Discuss the legal and ethical issues of this situation.

Reference no: EM13726796

Questions Cloud

What role should the u.s. government play in health care : What role, if any, should the U.S. Government play in health care coverage for Americans? Should the government's role in terms of health insurance be different for those with jobs and for those without jobs?
Discuss the republican revolution : Discuss the Republican Revolution and how it led to the downfall of the Qing (Manchu) Dynasty. What were the main causes for the revolution, and what were its objectives? Was the revolution successful, and why/why not?
Determine implications for each of the computed elasticities : What does this say about the elasticity demand for insurance products and  what were the insurance companies assuming the elasticity demand would be - Compute the elasticities for each independent variable.
What is the mood of the prelude : One of the most important Genres from the Baroque Era is the Fugue. We did not study it during class time, but I want you to learn how to learn about music on your own. What is the mood of the Prelude
Describe the purpose of firewalls : Briefly describe the purpose of firewalls and how they work, including two fundamental approaches to creating firewall policies and types of firewalls.
What author impact is on the reader : Compare his narrative to that of Phillis Wheatley's experience. You must use selected quotes from each, but then interpret, in your own words, what the quotes mean and what author's impact is on the reader.
Discuss the three levels of organizational culture : Based on the information provided, define and discuss the three levels of organizational culture. In your view, what changes can be brought into the various levels of organizational culture at Home Depot
What does say about elasticity demand for insurance products : What does this say about the elasticity demand for insurance products and  what were the insurance companies assuming the elasticity demand would be?
Operational overview of southwest airlines : Operational overview of Southwest Airlines. Why is the company so successful? Current economic condition of the airline industry. How would this affect southwest airlines

Reviews

Write a Review

Computer Networking Questions & Answers

  Foundation in developing the network design

The Fiction CEO has informed you that the capital budget for this migration cannot exceed $500,000 and must not interrupt business operations. What follows is a brief background that will serve as your foundation in developing the network design.

  What is the maximum data capacity for traffic

What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store?

  Determine performance of upgraded processor

If 30% of instructions need one memory access and another 5% need two memory accesses per instruction, determine the performance of upgraded processor with compatible instruction set.

  Explain how many dns servers are enough by using the

how many dns servers are enough? using the internet and any other sources of information come up with some guidelines

  Determine number wait states for proper system operation

How many wait states (clock cycles) need to be inserted for proper system operation if bus clocking rate is 8 MHz?

  Sequential circuit with two inputs

Derive a sequential circuit with two inputs (S1 and S2) and one output (z) using D flip flops that will output z=1 if a S1=S2=0 is input, then a S1=S2=1 is input, then a S1=S2=0 is input.

  What are the demerits that this method poses for your

q1. why might read write and read create rights pose a security threat?q2. how do clients receive updates in the

  Compare the two tools encase and ftk

Compare the two tools EnCase and FTK. Discuss the advantage or disadvantage of each tool.

  Explain the terms latency response time and jitter and

write a 2- to 4-page paper that includes the following based on your organizationmiddot explain the importance

  Describe file system principles and interpret the system

Identify, and describe the advantages, disadvantages, organization and functions of the major components of a modern operating system.

  Set up a small network with network

Required to set up a small network with network ID: 210.15.5.96/27. In this network, there are three routers, two servers, one acting as DHCP Server and another as Mail/DNS Server.

  Describe the features and benefits of csma-cd

For the purposes of this question you do not need to know about the token access method. You just want to explain the features and benefits of CSMA/CD.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd