SEC235 - Review Questions - Week 6

docx

School

Wilmington University *

*We aren’t endorsed by this school

Course

235

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

4

Uploaded by MajorField8912

Report
1 Week 6 Review Questions Nichole Watson SEC235: Networks and Telecommunications Christopher Chandler 16 June 2023
2 1. Why is a packet-filtering firewall a stateless device? 1. A packet-filtering firewall is a stateless device because it examines each packet and uses rules to accept or reject it without considering whether the packet is part of a valid and active session. (6.1.3 – Firewall Facts) 2. What is the difference between a proxy and a reverse proxy 1. A forward proxy server handles requests from inside a private network out to the internet. A reverse proxy server handles requests from the internet to a server located inside a private network. A reverse proxy can perform load balancing, authentication, and caching. (6.1.3 – Firewall Facts) 3. What are the benefits of a unified threat management (UTM) system? 1. The primary benefit of a unified threat management (UTM) system is that it provides a well-rounded security solution, while also reducing administrative requirements. This means it eliminates the need to install and manage multiple security devices and can be customized and expanded. It is excellent for start-up companies, with limited budgets, minimal office space, and remote working locations. ( 6.2.2 – Unified Threat Management (UTM) Appliances Facts) 4. What is the difference between a stateful and a stateless firewall? 1. A stateful firewall allows or denies traffic by examining information in IP packet headers. A stateless firewall allows or denies traffic based on virtual circuits of sessions. A stateless firewall is also known as a circuit-level proxy or a circuit-level gateway. (6.2.12 – Firewall Design and Configuration Facts) 5. Which type of computer might exist inside a screened subnet? 1. A screened subnet typically contains publicly accessible resources, such as web, FTP, or email servers. Creating a screened subnet is part of a layered security approach. (6.3.3 – Screened Subnet Facts) 6. How is an intrusion detection system different from an intrusion prevention system? 1. An intrusion detection system (IDS) is a device or software that monitors logs and detects security breaches. An IDS is a critical part of a network because it alerts administrators to possible network intrusions. The purpose of an IDS is not to prevent an attack, but instead to alert the IT security team of a possible threat. (6.4.3 – Intrusion Detection and Prevention Facts) 2. An intrusion prevention system maintains an active security role within the network. In addition to performing the functions of an IDS, an IPS reacts when security breaches occur. An IPS can terminate a session or restart other processes on the system, automate responses to malicious or suspicious traffic, perform
3 behaviors that can be seen by anyone watching the network, update filters and perform reverse lookups. (6.4.3 – Intrusion Detection and Prevention Facts) 7. What is the difference between anomaly-based and signature- based monitoring? 1. An anomaly-based detection first defines a baseline of normal network traffic and then monitors it. It looks for anything that falls outside of that baseline. Anomaly-based detection can recognize and respond to some unknown attacks (attacks that do not have a corresponding signature file), and anomaly-based usually causes more false positives than signature-based detection. (6.4.3 – Intrusion Detection and Prevention Facts) 2. Signature-based monitoring works where malicious packets have a unique fingerprint that an IDS uses to detect their presence. These fingerprints are referred to as signatures. It looks for patterns in the network traffic and compares them to known signatures. (6.4.3 – Intrusion Detection and Prevention Facts) 8. What is the difference between a managed and an unmanaged switch? 1. An unmanaged switch is fast, less expensive, and can connect to all devices in a small area like a home or small office. It connects ethernet devices with a fixed configuration that cannot be altered, and it can connect easily to devices and is ready to use without configuration. (7.1.4 – Switching Facts) 2. A managed switch has a web-based or command-line interface for configuration. It allows VLAN creation for segmentation and supports link aggregation. Lastly, it allows port configuration for port security. (7.1.4 – Switching Facts) 9. What is the difference between a Layer 2 and a Layer 3 switch? 1. A layer 2 switch operates at Layer 2 of the OSI model (data link layer). It understands the MAC addresses of connected end devices and transmits frames. 2. Layer 3 switches have the same capabilities, but more. Layer 3 can operate at Layer 2, but usually operates at Layer 3 (network layer) of the OSI model. Layer 3 can perform some router actions such as limited IP routing, an inspection of incoming packets, and dynamic routing decisions based on source and destination addresses contained. It can also transmit packets. (7.1.4 – Switching Facts) 10. How do VLANs work? 1. Virtual local area networks (VLANs) are created by configuring a physical Layer 2 switch into multiple virtual switches. These virtual switches each have their own broadcast domain. (7.2.2 – VLAN Facts)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4

Browse Popular Homework Q&A

Q: What were the two main goals of Martin Luther? Using three of his theses, rewrite them in your own…
Q: Consider the function below. Amplitude: -2 Domain: 0 Determine the following: 2 7 2 Is the function…
Q: }]] ]]] ] ]]] ]] 26. In the gel above, determine which lanes come from an individual with a mutated…
Q: A particle of mass m is placed in a finite square well potential of height V, and width a. a.…
Q: How many g Al must react with iodine to form Alls via the following reaction scheme to release…
Q: companies use the systematic approach for training employees. Explain and discuss it and give a…
Q: what is the sloution to 4(y+6)+2(3y-4)=2y-8
Q: 150. mL of 2.3×106 μM nitric acid is reacted with 0.0985 L of 1.8 M barium hydroxide. Determine the…
Q: Finding the Domain and Range of a Graph mine the Domain and Range for the graph below. Write your…
Q: What are the types of pulse modulation systems and define them?
Q: Suppose you have a monthly income of $1000, $850 in monthly expenses, and you can put money in a…
Q: Your task is to take an integer number n & prints the difference between the product of its digits…
Q: romosomes and Heredity tiple Choice: Write the CAPITAL letter of your answer choice in the blank AND…
Q: Two rocks collide in outer space. Before the collision, one rock had mass 15 kg and velocity m/s.…
Q: Community college students conduct a survey at their college. They ask "Do you plan to transfer to a…
Q: Find the area of each: Greater than z = -2.3. type your answer.... Less than 75 with a mean of 105…
Q: Consider A QRS below. Q Find the length of QR : sin S cos S = tan Q = :: 29 7 04 25 :: 23 7 00 :: 24…
Q: A boat is pulled toward a dock by means of a rope wound on a drum that is located 2 ft above the bow…
Q: Common Stock, Par Value $2.00; Authorized 100,000 shs, Issued and Outstanding 50,000 shares =…
Q: 0.0674 kg of aluminum sulfate is reacted with 0.139 kg of silver nitrate. Determine the following:…
Q: Suppose the credit market in Triumph, Illinois is described by the schedule shown below. Local…
Q: Write a Java program that contains two static methods: Method 2 called OddAvg( ) that calculates…