Security+ Guide to Network Security, Second Edition Lab Manual Solutions 11- 1 Chapter 11 Lab Manual Review Questions and Answers Lab 11.1 1. Which of the following defines and describes acceptable methods of connecting to an internal network from an outside source? a. b. c. d. e. remote access information protection perimeter security acceptable use none of the above 2. Which of the following defines and describes how physical security is maintained? a. b. c. d. e. remote access information protection perimeter security acceptable use none of the above 3. Arrange the following incident response categories in their proper order of completion in response to a virus incident. a. b. c. Identify the problem. Isolate the system. Notify the necessary people. The proper order is (b, c, a). 4. Which of the following is a level 1 security incident? a. b. c. d. sharing of user accounts computer virus infection employee termination abuse of access privileges 5. Which of the following is a level 3 security incident? a. sharing of user accounts b. c. d. computer virus infection employee termination abuse of access privileges Security+ Guide to Network Security, Second Edition Lab Manual Solutions 11- 2 Lab 11.2 1. Policies have the greatest effect on _________. a. managers b. c. d. users IT staff auditors 2. Categorize each of the following as either “M” (what policies must do) or “S” (what policies should do). a. b. c. d. e. f. g. Describe what is covered by the policies. State why the policy is needed. Be implemented and enforceable. Define contacts and responsibilities. Be concise and easy to understand. Balance protection with productivity. Discuss how violations will be handled. a. (S), b. (M), c. (M), d. (S), e. (M), f. (M), g. (S) 3. You must have management support to be able to implement a security policy. True or False? 4. Who should serve on a security committee to determine security policy requirements? a. b. c. d. management IT staff users all of the above 5. Which of the following are reasons for resistance to security policies? (Choose all that apply.) a. b. Employees do not like change. Security policies are illegal. c. d. Employees fear being spied on. all of the above Security+ Guide to Network Security, Second Edition Lab Manual Solutions 11- 3 Lab 11.3 1. Arrange the following in their proper order within the forensic process. a. b. c. d. e. analysis collection examination preparation documentation The correct order is d, b, c, a, e. 2. In network forensics, it is essential to keep track of the chain of custody when handling evidence. True or False? 3. When responding to an incident, you should do which of the following? a. b. c. d. e. Examine log files. Look for sniffers. Look for remote control programs. Look for file sharing programs. all of the above 4. If you are under attack from a hacker, what should you do first? a. b. c. d. Observe the attacker. Chase the attacker away. Back up the system. Catch the attacker. 5. If you want to prosecute an attacker, you should contact legal counsel immediately. True or False? 6. What is the primary reason that most computer crimes go unpunished? a. b. c. d. lack of education privacy issues lack of resources none of the above 7. A(n) _________ attack occurs when an attacker impersonates another system by using its IP address. a. b. c. d. DDoS IP spoofing IP splicing IP tampering Security+ Guide to Network Security, Second Edition Lab Manual Solutions 11- 4 8. A(n) _________ attack occurs when an attacker denies legitimate users access to a system. a. b. c. d. DDoS IP spoofing IP splicing IP tampering 9. A(n) _________ attack occurs when an attacker hijacks an active session. a. b. c. d. DDoS IP spoofing IP splicing IP tampering 10. Which of the following is the first step of risk management? a. b. c. d. e. monitoring evaluation of control management threat assessment inventory 11. In which of the following stages of risk management is a vulnerability list created? a. b. c. d. e. monitoring evaluation of control management threat assessment inventory 12. Which of the following stages of risk management is ongoing as the process evolves? a. b. c. d. e. monitoring evaluation of control management threat assessment inventory 13. In what area of security management do you use an intrusion detection system (IDS)? a. Security Technology Management b. c. Vulnerability Management Systems Availability 14. In what area of security management do you maintain a library of Security+ Guide to Network Security, Second Edition Lab Manual Solutions 11- 5 attack signatures? a. b. Security Technology Management Vulnerability Management c. d. Exploitation Management Systems Availability 15. Who is typically responsible for overseeing the risk management process? a. b. c. IT manager chief executive officer chief financial officer d. chief security officer