1. You should know the difference between an exploit and a vulnerability. Which of the following refers to a weakness in the system?
A) exploit B) vulnerability C) both D)
2. Which of the following is a rewrite of ipfwadm?
A) ipchains B) iptables C) Netfilter D) ipcook E) None of the choices.
3. Iptables is based on which of the following frameworks?
A) Netfilter B) NetDoom C) NetCheck D) NetSecure E) None of the choices.
4. Cisco IOS based routers perform basic traffic filtering via which of the following mechanisms?
A) datagram scanning B) access lists C) stateful inspection D) state checking E) link progressing F) None of the choices.
5. Which of the following correctly describe the potential problem of deploying Wi-Fi Protected Access to secure your wireless network?
A) potential compatibility problems with wireless network interface cards. B) potential compatibility problems with wireless access points. C) potential performance problems with wireless network interface cards. D) potential performance problems with wireless access points. E) None of the choices.
1. Right Answer: B Explanation: You should know the difference between an exploit and a vulnerability. An exploit refers to software, data, or commands capable of taking advantage of a bug, glitch or vulnerability in order to cause unintended behavior. Vulnerability in this sense refers to a weakness in the system.
2. Right Answer: A Explanation: ipchains is a free software based firewall running on earlier Linux. It is a rewrite of ipfwadm but is superseded by iptables in Linux 2.4 and above. Iptables controls the packet filtering and NAT components within the Linux kernel. It is based on Netfilter, a framework which provides a set of hooks within the Linux kernel for intercepting and manipulating network packets.
3. Right Answer: A Explanation: ipchains is a free software based firewall running on earlier Linux. It is a rewrite of ipfwadm but is superseded by iptables in Linux 2.4 and above.Iptables controls the packet filtering and NAT components within the Linux kernel. It is based on Netfilter, a framework which provides a set of hooks within theLinux kernel for intercepting and manipulating network packets.
4. Right Answer: B Explanation: In addition to deploying stateful firewall, you may setup basic traffic filtering on a more sophisticated router. As an example, on a Cisco IOS based router you may use ip access lists (ACL) to perform basic filtering on the network edge. Note that if they have denied too much traffic, something is obviously being too restrictive and you may want to reconfigure them.
5. Right Answer: B Explanation: Wi-Fi Protected Access (WPA / WPA2) is a class of systems to secure wireless computer networks. It implements the majority of the IEEE 802.11i standard, and is designed to work with all wireless network interface cards (but not necessarily with first generation wireless access points).
Leave a comment