You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest
network. The functional level of the forest is Windows Server 2003. The company has recently provided fifty laptops to its sales team
members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data
placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data
interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another.
Which of the following actions will you take to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
In order to enable wireless networking, you have to install access points in various areas of your office building. These access points generate
omni directional signals to broadcast network traffic. Unauthorized users can intercept these packets. Hence, security is the major concern for
a wireless network. The two primary threats are unauthorized access and data interception. In order to accomplish the task, you will have to
take the following steps:
Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only. This will
prevent the sales team members from communicating directly to one another.
Implement the IEEE 802.1X authentication for the wireless network. This will allow only authenticated users to access the network data
and resources.
Configure the wireless network to use WEP encryption for data transmitted over a wireless network. This will encrypt the network data
packets transmitted over wireless connections. Although WEP encryption does not prevent intruders from capturing the packets, it
prevents them from reading the data inside.
Fill in the blank with the appropriate term.
When two routers are used in a firewall configuration, the internal router is known as a .
Correct
interior router present in the screened host firewall architecture. It is attached to the perimeter network and protects the internal network
from the Internet and the perimeter net.
A choke router is basically employed for the job of packet filtering for the firewall. It is also used to provide access to selected services that
are outbound from the internal net to the Internet. These services may include outgoing Telnet, FTP, WAIS, Archie, Gopher, etc.
Sam works as a Network Administrator for Blue Well Inc. All client computers in the company run the Windows Vista operating. Sam creates a new user account. He wants to create a temporary password for the new user such that the user is forced to change his password when he logs on for the first time. Which of the following options will he choose to accomplish the task?
Enabling the user must change password at next logon option will make the given password a temporary password. Enabling this option
forces a user to change his existing password at next logon.
Answer B is incorrect. There is no such option in Windows Vista.
Answer D is incorrect. This option sets the password to never expire.
Answer A is incorrect. This option sets the existing password as a permanent password for the user. Only administrators can change
the password of the user.
You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?
Check the antivirus log and see if it is detecting your file as a virus and deleting it. All antivirus programs have a certain rate of false positives.
Since the file is being deleted from all computers, it seems likely that your antivirus has mistakenly identified that file as a virus.
Answer D is incorrect. The firewall log can help you identify traffic entering or leaving your network, but won't help with files being
deleted.
Answer B is incorrect. An IDS log would help you identify possible attacks, but this scenario is unlikely to be from an external attack.
Answer C is incorrect. Your system log can only tell you what is happening on that individual computer.
Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration. The tool uses raw IP packets to determine the following:
What ports are open on our network systems.
What hosts are available on the network.
Identify unauthorized wireless access points.
What services (application name and version) those hosts are offering.
What operating systems (and OS versions) they are running.
What type of packet filters/firewalls are in use.
Which of the following tools is Victor using?
Nmap is a free open-source utility for network exploration and security auditing. It is used to discover computers and services on a computer
network, thus creating a 'map' of the network. Just like many simple port scanners, Nmap is capable of discovering passive services. In
addition, Nmap may be able to determine various details about the remote computers. These include operating system, device type, uptime,
software product used to run a service, exact version number of that product, presence of some firewall techniques and, on a local area
network, even vendor of the remote network card. Nmap runs on Linux, Microsoft Windows etc.
Answer D is incorrect. Kismet is a Linux-based 802.11 wireless network sniffer and intrusion detection system. It can work with any
wireless card that supports raw monitoring (rfmon) mode. Kismet can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet can be
used for the following tasks:
To identify networks by passively collecting packets
To detect standard named networks
To detect masked networks
To collect the presence of non-beaconing networks via data traffic
Answer A is incorrect. Nessus is proprietary comprehensive vulnerability scanning software. It is free of charge for personal use in a
non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems. It is capable of checking various types of
vulnerabilities, some of which are as follows:
Vulnerabilities that allow a remote cracker to control or access sensitive data on a system.
Misconfiguration (e.g. open mail relay, missing patches, etc).
Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an
external tool) to launch a dictionary attack.
Denials of service against the TCP/IP stack by using mangled packets.
Answer B is incorrect. A sniffer is a software tool that is used to capture any network traffic. Since a sniffer changes the NIC of the LAN
card into promiscuous mode, the NIC begins to record incoming and outgoing data traffic across the network. A sniffer attack is a passive
attack because the attacker does not directly connect with the target host. This attack is most often used to grab logins and passwords from
network traffic. Tools such as Ethereal, Snort, Windump, EtherPeek, Dsniff are some good examples of sniffers. These tools provide many
facilities to users such as graphical user interface, traffic statistics graph, multiple sessions tracking, etc.
Stefania
6 days agoTiera
13 days agoSueann
20 days agoRosendo
28 days agoLaurene
1 month agoKanisha
1 month agoVanesa
2 months agoFletcher
2 months agoTish
2 months agoGlenna
2 months agoGearldine
3 months agoJutta
3 months agoKendra
3 months agoIrene
3 months agoTresa
4 months agoMarget
4 months agoCassie
4 months agoGerman
4 months agoTalia
5 months agoTess
5 months agoMarvel
5 months agoDaron
5 months agoBen
6 months agoHershel
6 months agoEmilio
8 months agoJoseph
8 months agoMargery
9 months agoSommer
10 months agoNakita
11 months agoShayne
12 months agoTran
12 months agoEarnestine
1 year agoSon
1 year agoTien
1 year agoBettina
1 year agoPearlie
1 year agoAlpha
1 year agoShaquana
1 year agoBilly
1 year agoChun
1 year agoKaran
1 year agoLuann
1 year agoIra
1 year agoFlorinda
1 year agoShalon
1 year agoGeorgiana
1 year agoShizue
1 year agoYun
1 year agoWilletta
1 year agoShaun
1 year agoRoselle
1 year agoTyra
1 year agoJanessa
1 year agoAlonso
1 year agoWilliam
1 year agoDeonna
2 years agoSalena
2 years agoElvera
2 years agoMaryann
2 years ago