Which of the following are the countermeasures against WEP cracking?
Each correct answer represents a part of the solution. Choose all that apply.
A user can use some countermeasures to prevent WEP cracking. Although WEP is least secure, it should not be used. However, a user can
use the following methods to mitigate WEP cracking:
Use a non-obvious key.
Use the longest key supported by hardware.
Change keys often.
Use WEP in combination with other security features, such as rapid WEP key rotation and dynamic keying using 802.1x.
Consider WEP a deterrent, not a guarantee.
Answer D is incorrect. SSID stands for Service Set Identifier. It is used to identify a wireless network. SSIDs are case sensitive text
strings and have a maximum length of 32 characters. All wireless devices on a wireless network must have the same SSID in order to
communicate with each other.
The SSID on computers and the devices in WLAN can be set manually and automatically. Configuring the same SSID as that of the other
Wireless Access Points (WAPs) of other networks will create a conflict.
A network administrator often uses a public SSID that is set on the access point. The access point broadcasts SSID to all wireless devices
within its range. Some newer wireless access points have the ability to disable the automatic SSID broadcast feature in order to improve
network security.
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest
network. The functional level of the forest is Windows Server 2003. The company has recently provided fifty laptops to its sales team
members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data
placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data
interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another.
Which of the following actions will you take to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
In order to enable wireless networking, you have to install access points in various areas of your office building. These access points generate
omni directional signals to broadcast network traffic. Unauthorized users can intercept these packets. Hence, security is the major concern for
a wireless network. The two primary threats are unauthorized access and data interception. In order to accomplish the task, you will have to
take the following steps:
Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only. This will
prevent the sales team members from communicating directly to one another.
Implement the IEEE 802.1X authentication for the wireless network. This will allow only authenticated users to access the network data
and resources.
Configure the wireless network to use WEP encryption for data transmitted over a wireless network. This will encrypt the network data
packets transmitted over wireless connections. Although WEP encryption does not prevent intruders from capturing the packets, it
prevents them from reading the data inside.
Fill in the blank with the appropriate term.
When two routers are used in a firewall configuration, the internal router is known as a .
Correct
interior router present in the screened host firewall architecture. It is attached to the perimeter network and protects the internal network
from the Internet and the perimeter net.
A choke router is basically employed for the job of packet filtering for the firewall. It is also used to provide access to selected services that
are outbound from the internal net to the Internet. These services may include outgoing Telnet, FTP, WAIS, Archie, Gopher, etc.
Sam works as a Network Administrator for Blue Well Inc. All client computers in the company run the Windows Vista operating. Sam creates a new user account. He wants to create a temporary password for the new user such that the user is forced to change his password when he logs on for the first time. Which of the following options will he choose to accomplish the task?
Enabling the user must change password at next logon option will make the given password a temporary password. Enabling this option
forces a user to change his existing password at next logon.
Answer B is incorrect. There is no such option in Windows Vista.
Answer D is incorrect. This option sets the password to never expire.
Answer A is incorrect. This option sets the existing password as a permanent password for the user. Only administrators can change
the password of the user.
You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?
Check the antivirus log and see if it is detecting your file as a virus and deleting it. All antivirus programs have a certain rate of false positives.
Since the file is being deleted from all computers, it seems likely that your antivirus has mistakenly identified that file as a virus.
Answer D is incorrect. The firewall log can help you identify traffic entering or leaving your network, but won't help with files being
deleted.
Answer B is incorrect. An IDS log would help you identify possible attacks, but this scenario is unlikely to be from an external attack.
Answer C is incorrect. Your system log can only tell you what is happening on that individual computer.
Allene
6 days agoTijuana
13 days agoAlida
21 days agoClemencia
28 days agoStefania
1 month agoTiera
1 month agoSueann
2 months agoRosendo
2 months agoLaurene
2 months agoKanisha
2 months agoVanesa
3 months agoFletcher
3 months agoTish
3 months agoGlenna
3 months agoGearldine
4 months agoJutta
4 months agoKendra
4 months agoIrene
4 months agoTresa
5 months agoMarget
5 months agoCassie
5 months agoGerman
5 months agoTalia
6 months agoTess
6 months agoMarvel
6 months agoDaron
6 months agoBen
7 months agoHershel
7 months agoEmilio
9 months agoJoseph
9 months agoMargery
10 months agoSommer
11 months agoNakita
1 year agoShayne
1 year agoTran
1 year agoEarnestine
1 year agoSon
1 year agoTien
1 year agoBettina
1 year agoPearlie
1 year agoAlpha
1 year agoShaquana
1 year agoBilly
1 year agoChun
1 year agoKaran
1 year agoLuann
1 year agoIra
1 year agoFlorinda
1 year agoShalon
1 year agoGeorgiana
1 year agoShizue
1 year agoYun
1 year agoWilletta
1 year agoShaun
1 year agoRoselle
1 year agoTyra
2 years agoJanessa
2 years agoAlonso
2 years agoWilliam
2 years agoDeonna
2 years agoSalena
2 years agoElvera
2 years agoMaryann
2 years ago