A network designer needs to submit a proposal for a company, which has just published a web
portal for its clients on the internet. Such a server needs to be isolated from the internal network,
placing itself in a DMZ. Faced with this need, the designer will present a proposal for a firewall with
three interfaces, one for the internet network, another for the DMZ server farm and another for the
internal network. What kind of topology will the designer propose?
Answer : A
The topology that the network designer will propose is known as a screened subnet. This topology involves the use of two or more firewalls to create a network segment referred to as a demilitarized zone (DMZ). The DMZ acts as a buffer zone between the public internet and the internal network. It contains the public-facing servers, such as the web portal mentioned, which is isolated from the internal network for added security. The screened subnet topology typically includes a firewall at the network's edge connected to the internet, another firewall separating the DMZ from the internal network, and the DMZ itself. This setup allows for strict control of traffic between the internet, the DMZ, and the internal network, providing an additional layer of security.
A CCTV camera, which can be accessed on the smartphone from a remote location, is an example of _____
What is the correct order of activities that a IDS is supposed to attempt in order to detect an intrusion?
Answer : B
An Intrusion Detection System (IDS) is designed to monitor network or system activities for malicious actions or policy violations. The correct order of activities that an IDS follows to detect an intrusion starts withIntrusion Monitoring, where it observes the network traffic or system events. Following this,Intrusion Detectiontakes place, where the IDS analyzes the monitored data to identify potential security breaches. Once a potential intrusion is detected, theResponsemechanism is activated to address the intrusion, which may include alerts or automatic countermeasures. Finally,Preventionis applied to improve the system's defenses against future intrusions based on the detected patterns and responses.
Which of the following connects the SDN application layer and SDN controller and allows communication between the network services and business applications?
Answer : C
In the context of Software-Defined Networking (SDN), the Northbound API is the interface that connects the SDN application layer to the SDN controller. It facilitates communication between the network services and business applications. The Northbound API allows applications to communicate their network requirements to the controller, which then translates these requirements into the network configurations necessary to provide the requested services.
Which filter to locate unusual ICMP request an Analyst can use in order to detect a ICMP probes
from the attacker to a target OS looking for the response to perform ICMP fingerprinting?
Answer : C
In the context of network security, ICMP fingerprinting is a technique used to determine the operating system of a target machine by analyzing its responses to ICMP requests. The correct filter to detect unusual ICMP requests that could be indicative of ICMP probes from an attacker is option C. This filter looks for ICMP echo requests (type 8) that do not have a corresponding echo reply (code 0). Since the code for an echo request is 0, the filter(!(icmp.code==8))is used to exclude other ICMP messages with different codes.
Which of the following can be used to suppress fire from Class K sources?
Answer : A
Class K fires involve cooking oils and fats, which are highly combustible and can ignite quickly at high temperatures. To suppress a Class K fire, a specific type of extinguishing agent is required that can separate and absorb the heat elements of the fire -- the fuel, oxygen, and heat necessary to start a fire. Foam extinguishers are most suitable for Class K fires because they use a substance that turns oils into foam, effectively smothering the fire and preventing re-ignition. Water should not be used on Class K fires as it can cause the oil to splatter and spread the fire. Carbon dioxide and dry chemical extinguishers are also not recommended for Class K fires as they do not adequately remove the heat from the fire.