Networking Essay

584 Words3 Pages
Chapter 11 Networking Plus 6th edition Questions 1. You work for a retailer that sells household goods online. The company has decided to redesign its network for better security. Included in this redesign is the addition of a new firewall. Assuming the firewall is placed between the internet connection and the Web server, which of the following should be included in the firewall’s configuration so that customers can still reach the Web site? b. Allow incoming TCP-based transmissions to port 80. 2. What of the following is the most secure password? c.!t1z0GS557x^^L 3. You are alerted that suddenly 100% of the resources on your two core routers are being used and no legitimate traffic can travel into or out of your network. What kind of security attack are you most likely experiencing? d. denial-of-service attack (an example: smurf attack) 4. What type of device guards against an attack in which a hacker modifies the IP source address in the packets he's issuing so that the transmission appears to belong to your network? b. proxy server 5. Which of the following devices can improve performance for certain applications, in addition to enhancing network security? b. proxy server 6. If a firewall performs nothing more than packet filtering, at what layer of the OSI Model does it operate? b. Network 7. Which of the following encryption methods provides the best security for data traveling over VPN connections? c. IPSec 8. Which of the following criteria could a router's ACL use for denying packets access to a private network? a. Source IP address 9. Which of the following network operating system logon restrictions is most likely to stop a hacker who is attempting to discover someone's password through a brute force or dictionary attack? d. number of

More about Networking Essay

Open Document