Review 5 Flashcards
week 21
. Access control lists enable or deny traffic and can be configured to help secure a router.
True—Access control lists can be implemented on a router and within firewalls; they enable or deny connections.
A MAC flood is when a person accesses a single port of a switch that was not physically secured.
False—A MAC flood is when numerous packets are sent to a switch, each with a different source MAC address, in an attempt to use up all the memory on the switch and causing a change of state known as failopen mode.
NAT is also known as IP masquerading.
True—NAT, which stands for network address translation, is also known as IP masquerading. It is the process of changing an IP address while it is in transit across a router.
The network 10.0.0.0 is a Class B private IP network.
False—10.0.0.0 is a network within the Class A private IP range. Class B is between 172.16.0.0 and 172.31.255.255.
One way to protect a WAN is to place all the computers behind a router.
False—By placing all the computers behind a router, you can protect the LAN. Ways to protect the wide area network include firewalling and monitoring.
A DMZ is a special area of the network accessed by clients on the Internet.
True—The DMZ, which stands for demilitarized zone, might include servers such as FTP, email, and Web that are accessible from people on the Internet, without enabling those people access to the LAN.
An intranet enables sister companies to access a secure area of a company’s network.
False—An intranet is usually used for remote employees of an organization. Sister companies and partner companies would usually connect to an extranet.
Network access control sets rules by which network connections are governed.
True—Network access control (NAC) helps control your network in a secure fashion by setting rules by which connections to the network are governed. One example of NAC is 802.1X.
Subnetting increases security by compartmentalizing a network.
True—One of the reasons that subnetting is implemented is to increase security by compartmentalizing the network. It is also used to make more efficient use of IP address space and reduce broadcast traffic and collisions.
One way to defend against a double-tagging attack is to put unplugged ports on the switch into an unused VLAN.
False—Putting unplugged ports on the switch into an unused VLAN is one way of defending against switch spoofing. Ways to defend against double tagging include upgrading firmware and picking an unused VLAN as the default VLAN.
Which of the following ways can help secure a modem? (Select the two best answers.) A. Use the callback feature. B. Mount the modem to the floor. C. Use telnet. D. Used strong passwords.
A. and D. Using the callback feature enables you to set the modem to call a specific person back at a preset phone number. Strong passwords and some type of authentication scheme can also help to secure a modem. Modems are generally not bolted to the floor; however, a PBX device might be. Telnet is an insecure application and protocol; it should be substituted with SSH.
Which of the following ranges comprise the well-known ports category? A. 1024–49,151 B. 0–1023 C. 49,152–65,535 D. 10.0.0.0–10.255.255.255
B. 0–1023 is the port range for the category called well-known ports. 1024–49,151 is the port range for the category known as registered ports. 49,152–65,535 is the port range for a dynamic and private ports. 10.0.0.0–10.255.255.255 is the range of private Class A IP addresses.
If a server has inbound Port 21 open, what service is it running? A. File Transfer Protocol B. Simple Mail Transfer Protocol C. Hypertext Transfer Protocol D. Kerberos
A. Port 21 corresponds to the File Transfer Protocol (FTP). The Simple Mail Transfer Protocol (SMTP) uses Port 25. The Hypertext Transfer Protocol (HTTP) uses Port 80. Kerberos uses Port 88.
To use the Lightweight Directory Access Protocol (LDAP) in a secure fashion, what port should be used? A. 443 B. 3389 C. 636 D. 389
C. Port 636 is used by Lightweight Directory Access Protocol (LDAP) over TLS/SSL. Port 443 is used by Hypertext Transfer Protocol Secure. Port 3389 is used by Remote Desktop Protocol. Port 389 is used by the standard Lightweight Directory Access Protocol.
Which of the following commands can be used to turn off a service? A. Net stop B. Net start C. Sc config D. # chkconfig off
A. Net stop is used to turn off the service in the command line within Windows. Net start is used to turn on a service from the command line in Windows. Sc config can be used to disable services. # chkconfig off is used to disable services in Linux.