100% Original, Plagiarism Free, Tailored to your instructions

Order Now!

IT Quiz part 2

Want create site? Find Free WordPress Themes and plugins.

Please complete homework and show explaination. 

Thank you

PROBLEM 1 – Network Access Control (20 points)(5 pts each)

a)  Which of the following are the most important functions of a NAC in setting up a compliance program? Explain.A) Policies, authentication and access controlB) Authentication, access control and remediationC) Authentication, access control and auditD) Policies, remediation and audit

b)  Which of the following are elements of the Separation of Duties principle of operations security? (Choose two.) Explain.A) Individuals rotate security-related duties so that no one person is permanently responsible for a sensitive function. B) Includes two-man and dual operator controls. C) Operators maintain an arms-length relationship with security controls. D) Continuous retraining of personnel. E) Ensures that no one person can compromise the whole system.

c)  What role does the policy server play in endpoint security? Explain.A) It retrieves security credentials directly from the endpoints.B) It evaluates security credentials and makes an admission control policy decision.C) It enforces admission control policy decision.D) All of the above

d)  A deviation from an organization-wide security policy requires which of the following? Explain.A) Risk AssignmentB) Risk ContainmentC) Risk AcceptanceD) Risk Reduction 

PROBLEM 2 – IPSec and VPN (20 points)(5 pts each)

a) Which two answers are the primary header formats for IPsec?A) Transport and Session HeaderB) Encapsulating and Authenticating HeaderC) Authentication Header and Encapsulating Security PayloadD) TCP and UDP 

b) In tunneling, an IP datagram is _______.A) First encapsulated in another datagram and then encrypted.B) First encrypted and then encapsulated in another datagram.C) First authenticated and then encrypted.D) First encrypted and then authenticated.

c) What is the relationship between a VPN and an extranet? Explain.A) Some extranets are VPNs; some VPNs are extranets. B) Some extranets are VPNs; all VPNs are extranets. C) VPNs and extranets are the same type of network. D) VPNs are unrelated to extranets.

d) Which one is the best approach to VPNs? Explain.A) VPN-specific gateway device. B) Router-based. C) Firewall-based. D) Software only. E) All of the above.

PROBLEM 3 – Firewalls (20 points)(5 pts each)

a) Which is untrue of a packet filtering firewall? Explain.A) High security.B) Application independence.C) Performance strength.D) Excellent scalability.

b) Firewalls can be implemented in different ways. Consider a dedicated firewall device. What is its major advantage when the target is throughput and security? Explain.A) The management console is easily installed.B) The device contains proprietary operating systems.C) The connection to the device is monitored by security personnel.D) A thorough packet inspection capability.E) The hackers know most router-based firewall code.

c) Of the following choices, which one is a type of firewall actively maintaining awareness of the status conversations between internal and external hosts? Explain.A) Stateful Firewall.B) Non-Passive Firewall.C) Active State Firewall. D) Stateless Firewall.E) None of the above

d) Which answer BEST describes a device that sits between your users and the internet and rewrites source ports and source IP Addresses and enhances your security posture? Explain.A) Network Address Translator. B) Web Proxy.C) Web Firewall.D) Host based firewall.

PROBLEM 4 – Wireless Network Security (20 points)(5 pts each)

a) What is the protocol developed for the wireless network communications? Explain.A) Wireless Encryption Protocol (WEP)B) Wireless Application Protocol (WAP) C) Wired Equivalent Privacy (WEP) D) Wireless Session Protocol (WSP)

b) Which of the following vulnerabilities is unique to 802.11 wireless LANs?A) Forged deauthenticate framesB) RF jammingC) TCP SYN floodsD) Data sniffing

c) You are assisting a user implement a wireless network in his home. The wireless hardware he has requires the RC4 protocol. What type of security is BEST for this network? Explain.A) WEPB) WPA-TKIPC) WPA-AESD) WPA2 Enterprise

d) Which of the following is not a reason why WEP may be considered vulnerable? Explain. (Select all that apply.)A) Shared WEP keys among all clientsB) 20-bit initialization vectorC) An RC4 engine not properly initializedD) 48-bit WEP keys

PROBLEM 5 – Web and Transport Layer Security (20 points)(5 pts each)

a) What kind of Encryption technology does SSL utilize?A) Secret or Symmetric keyB) Hybrid (both Symmetric and Asymmetric)C) Public KeyD) Private key

b) The role of SSL is to _________ A) Encrypt specific elements of data for application-specific purposes.B) Encrypt files located on a Web server.C) Encrypt data as it travels over a network.D) Encrypt digital certificates used to authenticate a Web site.E) Encrypt passwords for storage in a database.

c) Which two of the following technologies help protect web communications and promote a secure online environment?  Explain.A) SSH and SFTP.B) HTTP and PKI.C) SSL and TLS.D) SSL and Telnet.

d) Which of the following is the most common attack on DNS servers? Explain.A) PoisoningB) FloodC) PingD) Masquerading

Our Service Charter

  1. Excellent Quality / 100% Plagiarism-Free

    We employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers.
  2. Free Revisions

    We keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed.
  3. Confidentiality / 100% No Disclosure

    We make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service.
  4. Money Back Guarantee

    If the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit.
  5. 24/7 Customer Support

    We have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.

Excellent Quality
Zero Plagiarism
Expert Writers
Did you find apk for android? You can find new Free Android Games and apps.

Instant Quote

Single spaced
approx 275 words per page
Urgency (Less urgent, less costly):
Total Cost: NaN

Get 10% Off on your 1st order!