You are configuring your new IDS machine, and are creating new rules. You enter the following rule: Alert tcp any any -> 10.0.10.0/24 any (msg: "NULL scan detected"; flags: 0;) What is the effect of this rule?
Answer : D
You are designing a new IPSec implementation for your organization, and are trying to determine your security needs. You need to clearly understand the implementation choices, before you make any changes to the network. Which of the following describes what transport and tunnel modes protect using IPSec?
Answer : A, E
You are configuring your new IDS machine, and are creating new rules. You enter the following rule: Alert tcp any any -> 10.0.10.0/24 any (msg: "SYN-FIN scan detected"; flags:SF;) What is the effect of this rule?
Answer : A
You are configuring the new Intrusion Detection System at your office. Your CEO asks you what the IDS will do for the organization. You tell the CEO about the three main components of Network Security and explain how an IDS can be used to meet two of those components. What are the two major components of network security that an IDS can meet?
Answer : C, E
Your network is a mixed environment of Windows, Linux, and UNIX, computers. The routers are primarily Cisco and the network uses a T-1 to connect to the Internet. You are experimenting with setting up a mail server in a production environment for internal use only. You do not want this mail server to receive any requests from anywhere but the internal network. Therefore you have decided to block incoming SMTP traffic at the Firewall. Which port will you block at the Firewall?
Answer : B
You are building the rules of your new firewall. You wish to allow only (Internal) access to standard www sites on the Internet (External). You wish for all other traffic to be disallowed. Which of the following rules will you have to implement to make this happen?
Answer : C, D
It is a given that two computers that communicate using TCP/IP as the protocol must use valid addresses and media to do so. What combination of the following is required to create a TCP/IP socket?
Answer : B