Which of the following best describes Authentication?
You have been hired at a large company to manage network security issues. Prior to your arrival, there was no one dedicated to security, so you are starting at the beginning. You hold a meeting and are discussing the main functions and features of network security. One of your assistants asks what the function of Authentication in network security is. Which of the following best describes Authentication?
Which of the following best describes an Independent Audit?
The main reason you have been hired at a company is to bring the network security of the organization up to current standards. A high priority is to have a full security audit of the network as soon as possible. You have chosen an Independent Audit and are describing it to your coworkers. Which of the following best describes an Independent Audit?
Which of the following best describes an Operational audit?
The main reason you have been hired at a company is to bring the network security of the organization up to current standards. A high priority is to have a full security audit of the network as soon as possible. You have chosen an Operational Audit and are describing it to your coworkers. Which of the following best describes an Operational audit?
Which of the following are the reasons that the current auditing has little value?
You were recently hired as the security administrator of a small business. You are reviewing the current state of security in the network and find that the current logging system must be immediately modified. As the system is currently configured, auditing has no practical value. Which of the following are the reasons that the current auditing has little value?
Which of the following defines an event where an alarm does not occur and there is no actual intrusion?
You are configuring your new Intrusion Detection System, and studying the true-false matrix. You read about the different types of alarms and events. Which of the following defines an event where an alarm does not occur and there is no actual intrusion?
What are Authentication Tokens?
To increase the security of the network, you have decided to implement a solution using authentication tokens. You are explaining this to a coworker who is not familiar with tokens. What are Authentication Tokens?
What are Network Securitys five major issues?
The organization you work for has recently decided to have a greater focus on security issues. You run the network, and are called in the meeting to discuss these changes. After the initial meeting you are asked to research and summarize the major issues of network security that you believe the organization should address. What are Network Securitys five major issues?
What is the function of this rule?
You have recently taken over the security of a mid-sized network. You are reviewing the current configuration of the IPTables firewall, and notice the following rule:
ipchains -A output -p TCP -d ! 172.168.35.40 www
What is the function of this rule?
Which of the following defines an event where an alarm does not occur when an actual intrusion is carried out?
You are configuring your new Intrusion Detection System, and studying the true-false matrix. You read about the different types of alarms and events. Which of the following defines an event where an alarm does not occur when an actual intrusion is carried out?
What is the result of running the following command at the mysql prompt?
You have configured Snort to run on your SuSe Linux machine, and you are currently making the configuration changes to your MySQL database. What is the result of running the following command at the mysql prompt?
source /usr/share/doc/packages/snort/schemas/create_mysql;