9781111640125_IM_ch07

Security+ Guide to Network Security Fundamentals

  • Notes
  • 9
  • 100% (1) 1 out of 1 people found this document helpful

This preview shows page 3 - 6 out of 9 pages.

2. Note that FTP is used to connect to an FTP server, much in the same way that HTTP links to a Web server. 3. Discuss the ways for using FTP on a local host computer: a. From a command b. Using a Web browser c. Using an FTP client 4. Discuss the challenges that using FTP behind a firewall can present. 5. Explain that in FTP passive mode, the client initiates the data channel connection, yet instead of using the PORT command, the client sends a PASV command on the command channel. The server responds with the TCP port number to which the client should connect to establish the data channel (typically port 1025 to 5000). 6. Discuss the two options for secure transmissions over FTP. 7. Explain that SCP is an enhanced version of Remote Copy Protocol (RCP).
Image of page 3

Subscribe to view the full document.

Security+ Guide to Network Security Fundamentals, Fourth Edition 7-4 IPv6 1. Explain that the current version of the IP protocol is version 4 and is called IPv4. 2. Emphasize that the weaknesses in IPv4 have been solved in IPv6. 3. Use Figure 7-4 and Table 7-2 to explain the differences between IPv4 and IPv6. Quick Quiz 1 1. True or False: TCP/IP uses its own four-layer architecture that includes Network Interface, Internet, Transport, and Application. Answer: True 2. In a(n) ____ attack, an ICMP redirect packet is sent to the victim that asks the host to send its packets to another “router,” which is actually a malicious device. Answer: ICMP redirect attack 3. True or False: FTPS is a file transport layer resting “below” the SSL/TLS, meaning that it uses the FTP protocol to transfer files to and from SSL-enabled FTP servers. Answer: False 4. The current version of the IP protocol is called ____. Answer: IPv4 Network Administration Principles 1. Emphasize that administering a network can be a difficult task; administering a secure network can be even more challenging. 2. Define procedural rules as the authoritative and prescribed direction for conduct. 3. Explain that for information security, procedural rules can be external to the organization or internal. 4. Discuss technical rules, which may involve configuring a firewall or proxy server to conform to the procedural rules. 5. Emphasize that it is the role of the network administrator to follow a rule-based management approach. Teaching Tip Explain to students the relationship between Telnet, FTP and the other protocols presented in this chapter.
Image of page 4
Security+ Guide to Network Security Fundamentals, Fourth Edition 7-5 Device Security 1. Emphasize that securing devices is a never-ending task yet is key in maintaining a network’s security. 2. Explain device security includes establishing a secure router configuration, implementing flood guards, and analyzing device logs. 3. Discuss the importance of a router. 4. Use Table 7-3 to explain the tasks involved in basic secure router configuration.
Image of page 5

Subscribe to view the full document.

Image of page 6
You've reached the end of this preview.
  • '
  • NoProfessor
  • Transmission Control Protocol, File Transfer Protocol, Network Security Fundamentals, Security+ Guide

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern