Answers - 1(TCO A is malware that executes unexpected or unauthorized actions(Points 5 Phishing A smurf attack A Trojan horse A botnet attack Question

Answers - 1(TCO A is malware that executes unexpected or...

This preview shows page 1 - 3 out of 6 pages.

1. (TCO A) _____ is malware that executes unexpected or unauthorized actions. (Points : 5) Phishing A smurf attack A Trojan horse A botnet attack Question 2. 2. (TCO A) A man-in-the-middle attack is best mitigated by _____. (Points : 5) RFC 2082 ACL VPN RFC 2827 ACL ARP/RARP Question 3. 3. (TCO B) Which is the most appropriate choice for an enterprise network firewall? (Points : 5) Host-based firewall Software firewall Perimeter firewall Client firewall Question 4. 4. (TCO B) This firewall action only applies to TCP sessions; it does not support UDP sessions in which inbound TCP traffic is limited to return traffic from TCP sessions initiated from the inside of the network. (Points : 5) Timed ACLs Established ACLs Reflexive ACLs Context-based access control
Image of page 1
Question 5. 5. (TCO C) When a remote user attempts to dial in to the network, the network access server (NAS) queries the TACACS+ server. If the message sent to the server is REJECT, this means _____. (Points : 5) the user has not entered the correct username and password the user is prompted to retry the user is authenticated but not authorized the user is authorized but not authenticated Question 6. 6. (TCO C) Which protocols would be most suited for AAA on non-Cisco and Cisco equipment networks? (Points : 5) RADIUS and UDP TACACS+ and UDP TACACS+ and TCP RADIUS and TCP 1. (TCO A) Create an example of how to mitigate a technological weakness, and an example of how to mitigate a security policy weakness. Create your own examples rather than using the course material’s examples. (Points : 15) There are some of the configuration related weaknesses and also need to be evidence by network configuration of the network related servers, switches and routers that reduce the security of the network. For examples include leaving unused ports open on a server, perimeter router ACL configurations that do not mitigate common network related attack problematic scenarios and allowing clear-text of Telnet access to routers.
Image of page 2
Image of page 3

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture