which Snort can be configured to run?
Which of the following identifies the three modes in which Snort can be configured to run?
what was it designed for?
WEP is used on 802.11 networks, what was it designed for?
Which of the following is a common Service Oriented Architecture (SOA) vulnerability?
Which of the following is a common Service Oriented Architecture (SOA) vulnerability?
What is the most likely cause behind this?
RC4 is known to be a good stream generator. RC4 is used within the WEP standard on wireless
LAN. WEP is known to be insecure even if we are using a stream cipher that is known to be
secured.
What is the most likely cause behind this?
How can NMAP be used to scan these adjacent Class C networks?
A company has five different subnets: 192.168.1.0, 192.168.2.0, 192.168.3.0, 192.168.4.0 and
192.168.5.0. How can NMAP be used to scan these adjacent Class C networks?
Why does this happen in the VPN over wireless implementation?
In an attempt to secure his wireless network, Bob implements a VPN to cover the wireless
communications. Immediately after the implementation, users begin complaining about how slow
the wireless network is. After benchmarking the network’s speed. Bob discovers that throughput
has dropped by almost half even though the number of users has remained the same.
Why does this happen in the VPN over wireless implementation?
Computer Security Incident Response Team (CSIRT) provide?
Which vital role does the U.S. Computer Security Incident Response Team (CSIRT) provide?
Why do you think this is possible?
In an attempt to secure his wireless network, Bob turns off broadcasting of the SSID. He
concludes that since his access points require the client computer to have the proper SSID, it
would prevent others from connecting to the wireless network. Unfortunately unauthorized users
are still able to connect to the wireless network.
Why do you think this is possible?
which of the following techniques would be most effective in determining whether end-user security training wo
When utilizing technical assessment methods to assess the security posture of a network, which
of the following techniques would be most effective in determining whether end-user security
training would be beneficial?
Which of the following statements is true?
In an attempt to secure his 802.11b wireless network, Ulf decides to use a strategic antenna
positioning. He places the antenna for the access points near the center of the building. For those
access points near the outer edge of the building he uses semi-directional antennas that face
towards the building’s center. There is a large parking lot and outlying filed surrounding the
building that extends out half a mile around the building. Ulf figures that with this and his
placement of antennas, his wireless network will be safe from attack.
Which of the following statements is true?