Review Questions

advertisement
Chapter 7
Review Questions
1. Each of the following is one of the key principles of security except
a. layering
b. limiting
c. diversity
d. compatibility
2. Using several different types of security instead of just one is known as
a. limiting
b. layering
c. multi-security levels (MSL)
d. rootkits
3. Dividing a network into smaller units is called
a. segmentation
b. network division
c. domain restriction
d. device grouping
4. Networks in which devices can send packets at anytime are known as
a. non-deterministic
b. deterministic
c. resource allocation topologies (RAT)
d. managed
5. A _____ is the area that encompasses all of the network devices that can cause a
collision.
a. collision domain
b. distribution domain
c. broadcast domain
d. response area
6. Segments and subnets are identical. True or False?
7. Another name for a firewall is a packet filter. True or False?
8. A stateless packet filtering looks at the incoming packet and permits or denies it
based strictly on the rule base. True or False?
9. Stateful packet filtering keeps a record of the state of a connection between an
internal computer and an external server and then makes decisions based on the
connection as well as the rule base. True or False?
10. A demilitarized zone (DMZ) is the term used for separate network that sits
outside the secure network perimeter and is protected by a firewall. True or
False?
11. _____ replaces the sender’s actual IP address with another IP address. network
address translation (NAT)
12. Instead of giving each outgoing packet a different IP address, _____ assigns the
same IP address but a different port number. port address translation (PAT)
13. A packet that is intended for a single receiving device it is known as a(n) _____
transmission. unicast
14. A(n) _____ is a smaller logical grouping of network devices. virtual local area
network (VLAN).
15. The standard for marking VLAN packets is _____ IEEE 802.1q
16. Explain the advantages of the access point separating packets in a VLAN.
The flexibility of a wireless VLAN depends on which device separates the packets
and directs them to different networks. In some settings separating packets in a
wireless VLAN is done by the switch. Each AP is connected to a separate port on
the switch and represents a different VLAN. As packets destined for the wireless
LAN arrive at the switch the switch separates the packets and sends them to the
appropriate AP (VLAN). Yet this configuration has limitations. For example, if a
wireless user in one VLAN roams to another AP he may lose the ability to be
connected to that VLAN. A more flexible approach occurs when the access point is
responsible for separating the packets. Under this configuration a user can still
roam into different areas of coverage and be connected to the correct VLAN. The
key to this configuration is that different VLANs are transmitted by the AP on
different Service Set Identifiers (SSIDs). This enables only the clients associated
with a specific VLAN to receive those packets.
17. Why should access points not be placed above a suspended ceiling?
In buildings that have a false ceiling (sometimes called a drop or suspended ceiling),
there is a temptation to simply remove a ceiling tile, place the access point in the
space above the ceiling, and then replace the tile. However, this should not be done
unless a special enclosure surrounds the AP and its antennas. The air handling
space above drop ceilings (and sometimes even between the walls and under
structural floors) is used to circulate and otherwise handle air in a building. These
spaces are called plenums. Placing an access point in a plenum above a drop ceiling
can be a hazard. This is because if an electrical short in the access point were to
cause a fire, it would generate smoke in the plenum that would be quickly circulated
throughout the building. If it is required to place an AP in a plenum, it is important
to enclose it within a plenum-rated enclosure to meet fire safety code requirements
18. How does antispyware differ from antivirus software?
Antivirus software and antispyware software share many similarities. First,
antispyware software must be regularly updated defend against the most recent
spyware attacks. Second, antispyware can be set to provide both continuous realtime monitoring as well as perform a complete scan of the entire computer system at
one time. And like antivirus software, antispyware provides good visual tools
regarding the system scan. However, antispyware s can also provide more detailed
information and include additional tools such as system explorers, tracks erasers,
and browser restore programs.
19. What is a rootkit and how does it work?
A rootkit is a set of software tools used by an attacker to break into a computer and
obtain special operating system privileges in order to both perform unauthorized
functions and also hide all traces of its existence. A rootkit often includes several
programs designed to monitor traffic, create a back door into the computer, change
log files and attack other network devices. A rootkit itself causes no direct damage
to the computer; rather, its function is to hide the presence of other types of
malicious software. Rootkits accomplish this hiding by removing traces of log-in
records, log entries and related processes.
20. Explain how obscurity can be a valuable tool in protecting a wireless network.
In wireless information security, defending systems through obscurity can be a
valuable tool. It is important not to advertise what security is in place, the vendor of
the equipment, or any other seemingly harmless information that could be used in
an attack. For example, a wireless gateway that transmits the service set identifier
(SSID) of “Smith Family” or “ABC Corp” is providing information regarding the
location of the WLAN that an attacker may find useful. Another example is user
passwords. To predictably alter passwords when they expire (use password
SOCCER1 until it expires and then use SOCCER2 until it expires, etc.) is unwise.
Obscuring passwords by making each one unrelated to the previous password will
provide an additional level of security through obscurity.
Download