Why are computer networks so tough to secure

Assignment Help Computer Engineering
Reference no: EM1328887

There are 10 multiple choice questions regarding basic network security. I had answered what I thought would be the correct answers. If I am incorrect, please offer the correct answer along with your comments as to why your answers are correct.

1. Why are computer networks so difficult to secure?

a. User Anonymity
b. Networks are complex, dynamic, and difficult to understand and verify
c. There are many points of attack, making it difficult to completely secur
d. All of the above

My answer is all of the above

2. Which of the following are shortcomings of most intrusion detection systems?
a. Their effectiveness is based upon where you put them in your network.
b. Too may false alarms can cause an operator to disbelieve bona fide attacks.
c. They need to be continually updated to recognize the latest attacks.
d. They are limited in their ability to detect intrusive activity within encrypted data packets/sessions.
e. All of the above

My anser is C.

3. An intrusion detection sensor and "sniffer" have this in common.
a. They evesdrop on all network data looking for patterns of interest
b. It is difficult to detect that either is running somewhere on the network
c. They collect and store network information
d. All of the above
e. None of the above

My Answer is A but I am not sure

4. I used my firewall rule table to filter out (deny) IP addresses of "bad guys". Am I safe?
a. Yes, because I can accurately determine the packet sender from the IP address
b. No, because the attacker can put a fictitious source IP his/her packet.
c. Not necessarily, because the attacker may use micro-fragmentation to prevent the firewall from assembling the entire packet and reading the important TCP/UDP port information.
d. All but (A)

5. My answer is C

When placing VPN hardware on your corporate network to harness the Internet, you should consider placing it:
a. Just inside of your wireless access point
b. It depends on the operational needs and security model of your company.
c. Just outside of your corporate firewall
d. So that your network intrusion detection system can only see encrypted packets transmitted by the VPN hardware.

I am not sure what a VPN is actually...

6. My company is located in three geographical locations and is connected via the Internet. I purchase one Class C network and then assign contiguous blocks of IP addresses (subnets) to each location. The Internet has the capability to route between my locations. Twenty years ago, this would not have been possible. This is possible mostly due to the introduction of:

a. TCP
b. Classless Internet Domain Routing (CIDR)
c. Encryption
d. Firewalls

My answer would be d however I am confusing it with TCP.

7. The process of adding headers and trailers to an application data packet prior to transport over a network is called:

a. Encapsulation
b. Sequencing
c. Fragmentation
d. Complication

My answer would be a.

8.To securely encrypt data between company branch offices, using the public Internet as the communication network, I would use:

a. QoS Encryption
b. Link Encryption
c. A VPN
d. A firewall

My guess would be d.

9.I entered 'www.cybercrime.com' in my web browser and the web site comes up on my computer. How did the computer find this web server's IP address?

a. Domain Name Services (DNS)
b. Address Resolution Protocol (ARP)
c. Border Gateway Protocol (BGP)
d. Dynamic Host Configuration Protocol (DHCP)

My answer would be a.

10.Computers really communicate using their hardware (MAC) addresses. What service performs the translation between a computer's MAC and IP addresses?

a. Domain Name Services (DNS)
b. Border Gateway Protocol (BGP)
c. Dynamic Host Configuration Protocol (DHCP)
d. Address Resolution Protocol (ARP)

My answer would be b but I am confusing this with a.

Reference no: EM1328887

Questions Cloud

Explain key data regarding e-business : Explain Key data regarding E-Business and describe in your own words what an e-Business considers when planning for the IT infrastructure
What the command does, how it might be used : What the command does, how it might be used.
Find the annual demand of plywood in loads : Ken is in the lumber business. His competitor is Pacific Woods. The ordering cost for plywood is $25 and the carrying cost is 25% of the unit cost. The cost per load is $100.
Question on present value of a lump sum : Robert Blanding's employer offers its workers a two-month paid sabbatical every seven years. Assume Robert increases his annual contribution to $3,150. How large will his account balance be in seven years?
Why are computer networks so tough to secure : define Why are computer networks so tough to secure.
Regulating civil rights between state and federal : Describe the balance of powers between state and federal government while protecting civil rights.
Explain e-business marketing evaluation : Explain E-business Marketing Evaluation and eExplain how you would improve the marketing and customer service on Scamaless
How much juice will the costumer purchase in a month : how much juice will the costumer purchase in a perticular month. What is the elasticity of demand for juice.
The wine cellar places orders for a popular pinot : The Wine Cellar places orders for a popular Pinot Noir on a weekly basis. The weekly demand for this wine was found to approximately follow the probability distribution shown below.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Economic life of technology product

Explain what do you understand by the economic life of a technology product. Discuss how does economic life of the technology product is compared with the technology life and product life?

  Why array names are not assignable variables in c

Why  array names are not assignable variables in c

  Create an application that generates a quiz

Create an application that generates a quiz

  Describe a project that increase an intranet

Describe a project that increase an Intranet.

  Program in visual basic to calculate area of a triangle

Write down a program in the visual basic which determines the area of a triangle. If three sides a, b and c entered do not make a triangle transmit the message out to the screen that the data entered was invalid.

  Advantages and disadvantages of implementing a dfs

Advantages and disadvantages of implementing a DFS

  Find the budget areas and the resulting balance

You are to make a budgeting report for a local company using a C++ program. There are two input files. The first input file lists the individual areas a budget has been defined for. Two of these are two checking accounts where the budget is the am..

  Investigate typical applications of microprocessor based s

Investigate 3 typical applications of microprocessor based systems, which may conclue the following.

  Express the service quality problem

discuss the service quality problems that can occur in VOIP. Why are these problems so difficult to solve.

  Find the initial interval for the root search

Write down the corresponding MATLAB code. You should check (just for yourself) how your function works with an arbitrary unsorted array.

  Communication diagram and sequence diagram

Why you would generate a communication diagram in place of a sequence diagram? Describe what the arrow which points to an object in the communication diagram implies.

  What is tcp hijacking

What is TCP hijacking and how is it done? What are some defenses against it.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd