9781423902454_Sol_Ch12 - Network+ Guide to Networks, 5th...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Network+ Guide to Networks, 5 th Edition Solutions 12– 1 Network+ Guide to Networks, 5 th Edition Chapter 12 Solutions Review Questions 1. A hacker sends an e-mail message to everyone at your company. In the e-mail he alerts employees to a change in the health benefits Web site and requests users to follow a link to the new site, which, in fact, will capture the user’s private information. What security-threatening strategy is the hacker attempting? a. Phishing 2. You work for a retailer that sells household goods online. The company has decided to redesign its network for better security. Included in this redesign is the addition of a new firewall. Assuming the firewall is placed between the Internet connection and the Web server, which of the following should be included in the firewall's configuration so that customers can still reach the Web site? c. Allow incoming TCP-based transmissions to port 80. 3. Which of the following is the most secure password? c. !t1z0GS557x^^L 4. If you upgrade a 24-port hub that serves one of your organization's workgroups to a 24-port switch for better performance, how have you also improved security? d. You have prevented the possibility of one client eavesdropping on the transmissions issued by another client connected to the switch. 5. You are alerted that suddenly 100% of the resources on your two core routers are being used and no legitimate traffic can travel into or out of your network. What kind of security attack are you most likely experiencing? a. Denial-of-service attack 6. What type of device guards against an attack in which a hacker modifies the IP source address in the packets she's issuing so that the transmission appears to belong to your network? b. Proxy server 7. Which of the following devices can improve performance for certain applications, in addition to enhancing network security? b. Proxy server 8. Which of the following can automatically detect and deny network access to a host whose traffic patterns appear suspicious? d. IPS 9. Which of the following encryption methods provides the best security for data traveling over VPN connections?
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network+ Guide to Networks, 5 th Edition Solutions 12– 2 c. IPSec 10. Which of the following criteria could a router’s ACL use for denying packets access to a private network? a.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/15/2012 for the course CIS CIS120 taught by Professor Zales during the Spring '12 term at Harrisburg Area Community College.

Page1 / 5

9781423902454_Sol_Ch12 - Network+ Guide to Networks, 5th...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online