1. Network Security. Fundamentals. Steven Taylor. President, Distributed
Networking Associates, Inc. Publisher/Editor, Webtorials [email protected].
Introduction. • Welcome to the course! • Instructor: ▫ Dr. Charles J. Antonelli. LSA
Information Technology. 500 S State Ste 1112 [email protected], 734 763 0607.
Network Security Basics. ▫ Security Issues, Threats and Attacks. ▫ Cryptography
and Public Key Infrastructure. ▫ Security on Different Layers. ▫ Layer 2 and BGP ...
Fundamentals of Network Security Graphic Symbols ..... Users also inadvertently
download viruses, Trojans horses, and hostile java and active-x code from ...
Cisco Secure Services Client Administrator Guide, Release 5.1.1. OL-15540-02.
1. 802.11 Network Security Fundamentals. This chapter provides an overview of
...
Grant) and the dour Mark Darcy (Colin Firth), whom she overhears calling her ... 3
. Bridget Jones's Diary is a 20th century re-interpretation of Pride and Prejudice.
Practice singing “Blessed Be the Name” in Hindi, or arrange for someone else to
lead the children in learning and ... Lesson Plan: • Welcome the children to the ...
Service, the Tennessee Municipal Technical Advisory Service, and the University of Tennessee. He is also the author of m
Server Administration Fundamentals. Prerequisite: Basic computer skills. Note:
Textbook required; DVD-RW disc required. Learn server fundamentals such as ...
Cryptography and. Network Security. Chapter 4. Fifth Edition by William Stallings.
Lecture slides by Lawrie Brown. (with edits by RHB). Chapter 4 – Basic ...
Welcome to the Microsoft Official Academic Course (MOAC) program for
Windows Server. Administration Fundamentals. MOAC represents the
collaboration ...
98-372. MTA: Microsoft .NET Fundamentals. Audience. Microsoft Technology ...
Candidates for this exam are seeking to prove knowledge and skills on Microsoft
...
Nov 3, 2016 - input or output leads to a sane state. These occur when the emulator emulates a transition arrow of the IFSM using multiple instructions.
Nov 3, 2016 - âA program that allows you to do something that you are not .... Pairs are either empty (and both 0), or represent secret/password combo.
QuickBooks user more efficient by reducing the amount of data to be entered to ...
Exercise 9.4, Task 2: General Ledger - See the notes on Creating a Traditional.
In this lesson we shall consider the following aspects of HDLC: • Stations and ...
Within a network using HDLC as its data link protocol, if a configuration is used in
..... Many other data link protocols have been derived from HDLC. However ...
Reading Plus. Lesson 4. Exercise 14. A. Scanning: 1. How many times does the
word “Indian” appear in this timed writing? 2. How many oceans are named in ...
In talking about the demonstrations you just watched, you might give ... scientific
explanation would also talk about what the molecules are doing and how they ...
Flexure (Theories and. Examples) ... and slabs,. • name three different types of
reinforced concrete beam with their specific applications, ... Reinforced concrete
beams and slabs carry loads primarily by bending. (Figs. 3.4.1 to 3). They are ...
Sep 8, 2013 ... Purple = Social Studies SC State Standards. Daily Essential ... What is an
example of a thoughtless action? ... Avoiding Thoughtless Actions.
Sep 8, 2017 - ... Fundamentals of Network Security email address below and we ll send you a link to download the free Fu
... get started Double click the downloaded file to install the software span class news ... serie de hojas de papel per
MTA Security Fundamentals Lesson 4: Understanding Network ...
Period ______. MTA Security Fundamentals. Lesson 4: Understanding Network
Security. Key Terms application-level firewall - circuit-level firewall -.
Name ____________________________________________
MTA Security Fundamentals Lesson 4: Understanding Network Security Key Terms application-level firewall circuit-level firewall DMZ (demilitarized zone) DNS Security Extensions (DNSsec) DNS poisoning DNS spoofing firewall Honey net Honeypot – host firewall intrusion detection systems (IDS) intrusion prevention systems (IPS) MAC address Network Access Protection (NAP) network firewall Open Systems Interconnect (OSI) padded cell – personal firewall Secure Content Management (SCM) – spoofing stateful inspection Unified Threat Management (UTM) -
Period ______
Multiple Choice: Circle the letter or letters that correspond to the best answer or answers. 1. Which of the following elements and issues should be considered when deciding whether to use a software or hardware firewall? (Choose all that apply.) a. Host operating system
d.
Firewall service efficiency
b. Application conflicts
e.
Stability
c.
Operating system version
2. Which of the following are layers of the OSI model? (Choose all that apply.) a. Physical
d.
Network
b. Control
e.
Encryption
a. Physical
d.
Session
b. Data link
e.
Network
c.
Application
3. At which layer of the OSI model does routing occur?
c.
Transport
4. Which of the following are valid firewall types? (Choose the best answer.) a. Virtual
d.
IPsec
b. Network
e.
Application
c.
Packet filtering
5. Which of the following pieces of information are typically examined by a stateful inspection firewall? a. IP address of the sending host
d.
Data packet type
b. IP address of the receiving host
e.
Data packet size
c.
IP address of the router
6. What is the purpose of NAP? (Choose the best answer.) a. NAP translates private IP addresses to Internet-routable IP addresses. b. NAP permits a firewall to perform deep inspection on packets. c.
NAP provides a mechanism to perform network analysis on captured packets.
d. NAP controls what systems are permitted to connect to a network. 7. An attack that relies on having a user execute a malicious script embedded in a web page is which kind of attack? (Choose the best answer.) a. Man in the middle
c.
Cross-site scripting
b. Brute force
d.
SQL injection
8. You have just purchased a new wireless access point for your small computer services company, and you want to ensure that only your systems are able to connect to the wireless network. To that end, you enable MAC address filtering and put the MAC addresses of all your computers in the permitted table. At what layer of the OSI model does this filtering occur? a. Physical
d. Transport
b. Data link
e. Session
c. Network 9. You are the Information Security Officer for a medium-sized manufacturing company, and your sales team has just deployed a new e-commerce application to allow for the direct sale of your products to your customers. To secure this application, you are deploying an application firewall. At what layer of the OSI model does this filtering occur? (Select all answers that apply.) a. Physical
d. Presentation
b. Data link
e. Application
c. Network 10. Which of the following are components of Network Access Protection? (Choose all that apply.) a. MAC address compliance
d.
IP address mode
b. Health policy compliance
e.
Health state validation
c.
Limited access mode
11. Which of the following are password-based attacks? (Choose all that apply.) a. Replay attacks
d.
Man in the middle attacks
b. Network sniffer attacks
e.
Dictionary attacks
c.
Brute force attacks
12. What type of attack relies on the attacker tricking the sending host into thinking his or her system is the receiving host, and the receiving host into thinking his or her system is the sending host? (Choose the best answer.) a. Replay attack
d.
Cross-site scripting attack
b. Brute force attack
e.
SQL injection attack
c.
Man in the middle attack
13. Which of the following systems cannot participate in a NAP implementation? (Choose all that apply.) a. Windows 7 Home
d.
Windows Vista Ultimate
b. Windows 7 Home Premium
e.
Windows 7 Professional
c.
Windows XP Service Pack 2
14. Which of the following are common uses for a VPN? a. Remote access b. Server isolation c.
Intrusion detection
d. Extranet connections e. Domain isolation
15. Which of the following are common types of routing protocols? (Choose all that apply.) a.
Link vector
b. Dynamic link c.
d.
Distance vector
e.
Link state
Distance link
Fill in the Blank 1.
You are a network administrator, and you have just been put in charge of registering your company’s domain name and setting up the DNS so that people on the Internet can get to your website. Here, __________________ can be used to ensure that your DNS entries are not poisoned by an attacker.
2.
The two most common protocols you can use to create a VPN are __________________ and __________________.
3.
The three common types of protocol spoofing are __________________, __________________, and __________________.
4.
The type of attack that relies on a weakness in an operating system or an application is known as a(n) __________________.
5.
An attack that relies on access to a physical LAN segment is known as a(n) __________________ attack.
6.
An attack that records a stream of data, modifies it, and then resends it is known as a(n) __________________ attack.
7.
The two common types of Network Address Translation are __________________ and __________________.
8.
If you are setting up a WLAN in a corporate environment and you want to use 802.1x and a RADIUS server to secure the connections, you need to use __________________keys.
9.
The four mechanisms used by NAP to restrict network access and enforce policies are __________________, __________________, __________________, and __________________.
10.
A(n) __________________ can be deployed to distract an attacker from the critical systems on your network.