Question

Network Security Class Questions Which statement best describe the term “Network Enumeration”? (...

Network Security Class Questions

  1. Which statement best describe the term “Network Enumeration”? (NOT SURE)
  1. Network Enumeration means by hackers scout target leverage techniques over the phone to make the target reveal critical information such as SSN, credit information
  2. Network Enumeration means “case the joint” this is another form of intelligence gathering
  3. Enumeration identifies and poorly protected resource shares are exploited to gain access
  4. Network Enumeration describe the motivation of a hacker and the level of ingenuity of the hackers
  5. All of the above
  1. Choose the best combination that describes six security design concepts an organization should consider from a security technologies perspective to secure their networks?
  1. Layers security, controlling access, role-specific security, user awareness, monitoring, and keeping systems patched.
  2. Single point of defense, limited control on devices, individual user id based security policy, limited user knowledge regarding security, limited monitor on servers and limited implementation of patches.
  3. Single perimeter of defense, very limited role based security setup, only monitoring of servers, limited operating system patch implementation, keep user community isolated form security flaws, single point of contact of security breaches and limited restriction on ports at workgroup router.
  4. All of the above
  1. What would be the deciding factors that an organization may choose to implement Layer 2 Tunneling Protocol (L2TP) versus Point-to-Point Tunneling Protocol (PPTP)?
  1. Since L2TP secures utilizing IPsec transport, IPsec Encapsulating Security Payload (ESP) protects UDP payload to ensure secure communication.
  2. L2TP requires the same user-level authentication, as well as computer-level authentication through a computer certificate.
  3. Due to the implementation of IPsec in L2TP, it provide data integrity proof and data confidentiality.
  4. L2TP connection provides per packet authentication, and protection for control and data packets.
  5. All of the above.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer)

1) b) This is another form of intelligence gathering as it helps in collecting information about the username and information about the groups, shares, services, as well as the networked computers.

2) a) Layers security, controlling access, role-specific security, user awareness, monitoring, auditing and finally keeping the systems patched.

The monitoring and auditing are a more important aspect of the security

3) All of the above as the L2TP is used for the same user-level authentication as well as the computer level authentication via the computer certificate, it also leads to providing the data integrity and confidentiality, and also has a packet authentication for protection and control of the data packets.

If you found the answer useful, hit like
Hope this answer helps.
Thanks

Add a comment
Know the answer?
Add Answer to:
Network Security Class Questions Which statement best describe the term “Network Enumeration”? (...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of...

    The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of several banks that are a part of the SWIFT network. The case is an example of the importance of information system controls. Explain some of the security risks associated with information systems as well as some security and control measures that can be implemented to protect against these security risks. Hackers Attack the SWIFT Global Banking Network SWIFT, which stands for Society for Worldwide...

  • Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer...

    Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer the question 1. In this chapter, media is defined as a type of communication. b. a type of ink. c. data storage devices. d. A and C 2. What statement is not correct? a. A personal computer is a single user electronic data processing device. b. A personal computer and peripheral devices are hardware. c. Output devices allow data to be entered into the...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Chapter 18: wireless networks TRUE OR FALSE                                    

    Chapter 18: wireless networks TRUE OR FALSE                                                                                                     T          F          1. As the demand for broadband Internet access has grown, providers of wired local loop service have responded with increasing reliance   on optical fiber and coaxial cable. T          F          2. A BWA provider services one or more cells. T          F          3. Wireless systems are more expensive than wired systems. T          F          4. IEEE 802.16 and the associated WiMAX specification now deal with      both fixed and mobile BWA. T          F         ...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of...

    CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of Personnel Management (OPM) is conducted, may have been extracted. Government offi responsible for recruiting and retaining a world-class cials say that the exposure of security clearance irn workforce to serve the American people and is also mation could pose a problem for years responsible for background investigations on pro- spective employees and security clearances. In June the OPM system, and its records were protected...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT