CNT4182 quiz

docx

School

Florida International University *

*We aren’t endorsed by this school

Course

4182

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by MegaTank13330

Report
What is the purpose of a firewall in network security, and how does it function to protect a network? a) To encrypt all network traffic for secure transmission b) To filter incoming and outgoing network traffic based on predetermined security rules c) To authenticate users before granting them access to the network d) To monitor network performance and optimize data transfer speeds What is the difference between symmetric and asymmetric encryption algorithms, and when might each be used in network communication? a) Symmetric encryption uses different keys for encryption and decryption, while asymmetric encryption uses the same key for both. b) Symmetric encryption is faster but less secure than asymmetric encryption. c) Asymmetric encryption is used for secure transmission of bulk data, while symmetric encryption is used for securely exchanging encryption keys. d) Asymmetric encryption is suitable for encrypting data at rest, while symmetric encryption is suitable for encrypting data in transit. What are the main components of a Virtual Private Network (VPN), and how does it enhance network security for remote access? a) VPN concentrator, encryption algorithm, and firewall; it enhances security by creating a secure tunnel over the public internet. b) VPN client software, authentication server, and intrusion detection system; it enhances security by isolating remote users from the corporate network. c) VPN router, encryption algorithm, and access control list; it enhances security by encrypting all data transmitted between the remote user and the corporate network. d) VPN gateway, tunneling protocol, and user authentication mechanism; it enhances security by securely connecting remote users to the corporate network over an encrypted tunnel. Explain the concept of a Denial of Service (DoS) attack, and describe two common techniques used to launch such attacks on network resources. a) A DoS attack floods a network or system with excessive traffic or requests, causing it to become unavailable to legitimate users. Two common techniques include phishing and social engineering.
b) A DoS attack exploits vulnerabilities in network protocols to intercept and modify data packets in transit. Two common techniques include ARP spoofing and DNS cache poisoning. c) A DoS attack overwhelms a network or system with malicious traffic or requests, consuming its resources and making it inaccessible to legitimate users. Two common techniques include ICMP flood and SYN flood attacks. d) A DoS attack exploits weak authentication mechanisms to gain unauthorized access to network resources. Two common techniques include brute force attacks and dictionary attacks. What role does Intrusion Detection System (IDS) play in network security, and how does it differ from Intrusion Prevention System (IPS)? a) IDS monitors network traffic for suspicious activity and generates alerts when potential security breaches are detected, while IPS actively blocks or mitigates detected threats in real-time. b) IDS and IPS are two terms used interchangeably to refer to systems that protect networks from unauthorized access. c) IDS scans network traffic for malware and viruses, while IPS scans network devices for vulnerabilities and patches them automatically. d) IDS authenticates users before granting them access to the network, while IPS encrypts data transmitted over the network to prevent eavesdropping.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help