每时每刻 可信安全 1The two most common implementations of Intrusion Detection are which of the following? A Netware-based and Host-based. B Network-based and Guest-based.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
SCSC 455 Computer Security Virtual Private Network (VPN)
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Guide to Network Defense and Countermeasures Second Edition
Firewalls and Intrusion Detection Systems
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Security Awareness: Applying Practical Security in Your World
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Internet Protocol Security (IPSec)
Chapter 20: Network Security Business Data Communications, 4e.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Lecture 24 Secure Communications CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Ian Goldberg.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
Chapter 13 – Network Security
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
ICT 6621 : Advanced NetworkingKhaled Mahbub, IICT, BUET, 2008 Lecture 12 Network Security (2)
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Lecture 24 Secure Communications CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Ian Goldberg.
Network Security Fundamentals Chapter 6: Securing Network Transmission.
TCP/IP Protocols Contains Five Layers
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Tunneling and Securing TCP Services Nathan Green.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Securing Network Communications Using IPSec Chapter Twelve.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
K. Salah1 Security Protocols in the Internet IPSec.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
IT443 – Network Security Administration Instructor: Bo Sheng
Domain 4 – Communication and Network Security
– Chapter 3 – Device Security (B)
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Presentation transcript:

每时每刻 可信安全 1The two most common implementations of Intrusion Detection are which of the following? A Netware-based and Host-based. B Network-based and Guest-based. C Network-based and Client-based. D Network-based and Host-based. D

每时每刻 可信安全 2 Which of the following is the least important security service provided by a firewall? A Packet filtering B Encrypted tunnels C Network address translation D Proxy services B

每时每刻 可信安全 3 What are the two layers of OSI/ISO model within which SSL is designed to operate? A Application/Presentation layer B Application/Session Layer C Application/Transport D Application/Network C

每时每刻 可信安全 4 Which type of attack involves the alteration of a packet at the IP level to convince a system that it is communicating with a known entity in order to gain access to a system? A TCP sequence number attack B IP spoofing attack C Piggybacking attack D Teardrop attack B

每时每刻 可信安全 5 Which of the following can best eliminate dial-up access through a Remote Access Server as a hacking vector? A Using a TACACS+ server. B Installing the Remote Access Server outside the firewall and forcing legitimate users to authenticate to the firewall. C Setting modem ring count to at least 5. D Only attaching modems to non-networked hosts B

每时每刻 可信安全 6Which of the following should be used as a replacement for Telnet for secure remote login over an insecure network? A S-Telnet B SSL C Rlogin D SSH D

每时每刻 可信安全 7 Which of the following is the primary security feature of a proxy server? A Client hiding B URL blocking C Route blocking D Content filtering A

每时每刻 可信安全 8 Which conceptual approach to intrusion detection is characterized with a high rate of false positives? A Knowledge-based intrusion detection B Statistical analysis-based intrusion detection C Host-based intrusion detection D Network-based intrusion detection B

每时每刻 可信安全 9 Which of the following protects Kerberos against replay attacks? A Tokens B Passwords C Cryptography D Time stamps D

每时每刻 可信安全 10 What is called an attack where the attacker spoofs the source IP address in an ICMP ECHO broadcast packet so it seems to have originated at the victim's system, in order to flood it with REPLY packets? A SYN Flood attack B Smurf attack C Ping of Death attack D Denial of Service (DOS) attack B

每时每刻 可信安全 11 What is the main difference between a Smurf and a Fraggle attack? A A Smurf attack is ICMP-based and a Fraggle attack is UDP- based. B A Smurf attack is UDP-based and a Fraggle attack is TCP- based. C Smurf attack packets cannot be spoofed. D A Smurf attack is UDP-based and a Fraggle attack is ICMP- based. A

每时每刻 可信安全 12 Which of the following is true about link encryption? A Each entity has a common key with the destination node. B Encrypted messages are only decrypted by the final node. C This mode does not provide protection if the nodes along the transmission path can be compromised. D Only secure nodes are used in this type of transmission C

每时每刻 可信安全 13 Secure Sockets Layer (SSL) provides security services at which layer of the OSI model? A Network Layer B Transport Layer C Session Layer D Application Layer B

每时每刻 可信安全 14 A TCP SYN attack: A requires a synchronized effort by multiple attackers. B takes advantage of the way a TCP session is established. C may result in elevation of privileges. D is not something system users would notice B

每时每刻 可信安全 15Which of the following protocols is designed to send individual messages securely? A Kerberos B Secure Electronic Transaction (SET). C Secure Sockets Layer (SSL). D Secure HTTP (S-HTTP). D

每时每刻 可信安全 16 Which of the following provide network redundancy in a local network environment? A Mirroring B Shadowing C Dual backbones D Duplexing C

每时每刻 可信安全 17 Which one of the following is not a benefit resulting from the use of firewalls? A reduces the risks from malicious hackers B prevents the spread of viruses C reduces the threat level on internal system D allow centralize management and control of services B

每时每刻 可信安全 18 In a SSL session between a client and a server, who is responsible for generating the master secret that will be used as a seed to generate the symmetric keys that will be used during the session? A Both client and server B The client's browser C The web server D The merchant's Certificate Server B

每时每刻 可信安全 19 Which of the following is not a component of IPSec? A Authentication Header B Encapsulating Security Payload C Key Distribution Center D Internet Key Exchange C

每时每刻 可信安全 20 Lower Layers (Physical, Link, Network, Transport) are unable to protect against what kind of attacks? A Piggy Back Attacks B Brute Force C Denial of Service Attacks D Content Based Attacks D

每时每刻 可信安全 21 What mechanism is used to obtain an IP address from a MAC address? A Reverse address resolution protocol (RARP) B Address resolution protocol (ARP) C Data link layer D Network address translation (NAT) A

每时每刻 可信安全 22 Encapsulating Security Payload (ESP) authentication capabilities are limited due to: A Non-inclusion of IP header information in authentication process B Because it is designed only for confidentiality C Because ESP provide payload padding and this change authentication parameters D Rule-based Access control A

每时每刻 可信安全 23 Which of the following backup method must be made regardless of whether Differential or Incremental methods are used? A Full Backup Method. B Incremental backup method. C Supplemental backup method. D Tape backup method. A

每时每刻 可信安全 24 Which of the following statements pertaining to incident response is correct? A As Computer Emergency Response Team (CERT) is copyrighted, Computer Incident Response Team (CIRT) is more often used. B As Computer Incident Response Team (CIRT) is copyrighted, Computer Emergency Response Team (CERT) is more often used. C Computer Incident Response Team (CIRT) and Computer Emergency Response Team (CERT) are used interchangeably. D Computer Incident Management Team (CIMT) is sometimes used, but Computer Emergency Response Team (CERT) should be preferred. A

每时每刻 可信安全 25 What is NOT true with pre shared key authentication within IKE / IPsec protocol? A pre shared key authentication is normally based on simple passwords B needs a PKI to work C Only one preshared key for all VPN connections is needed D Costly key management on large user groups B