A security analyst is hardening a web server that only host and run web service, which of following ports and protocols should be enabled? a IMAP over port 143 b Telnet over port 23 c FTP over port 21 d HTTPS over port 443
Q: Explain what is IPSec. IPSec uses two modes: tunnel mode and transport mode. Outline in which…
A: Explain what is IPSec. IPSec uses two modes: tunnel mode and transport mode. Outline in which…
Q: You are sending a request to retrieve a web page from the Liverpool FC website (Liverpoolfc.com ~ IP…
A: Given that, a request is sent to retrieve a web page from the Liverpool FC website from the personal…
Q: )IPSEC provides security at which layer of the network a Network b Data Link c…
A: IPSEC protocol was developed by The Internet Engineering Task Force, or IETF.
Q: The internet protocol (IP) operates at the OSI model's Transport layer. Group of answer choices…
A: 1. Defined the given statement as true or false
Q: Task Submission Use the IP range of 192.168.0.0 to 192.168.255.255 and divide into 4 subnets, each…
A: Use the IP range of 192.168.0.0 to 192.168.255.255 and divide into 4 subnets, each having a capacity…
Q: 1. Subneting IP Networks - Given the address hlack of 192.168.90.0/24,erente an TP addressing neheme…
A: Subnet : A network which is defined under another network is called a Subnet. This is done to avoid…
Q: Using Snort: Briefly test and explain the following rules. Show screenshots of your test. Rule #1:…
A: check further steps for the answer :
Q: When we run IPCONFIG without any switches, we will see all of the following information, except:…
A: ipconfig displays Internet Protocol version 4 (IPv4) and IPv6 addresses, subnet mask, and default…
Q: In which of the following applications can a virtual IP address be used? [Choose all that apply].…
A: Answer : NAT Gateway Rendundancy Protocols
Q: ICMP runs on top of UDP True False QUESTION 32 ARP translates…
A: I have given an answer in step 2.
Q: q38- Which statement is true about VLSM? Select one: A. It implies classful routing B. It is only…
A: - We have to talk about VLSM. - The options :: First option states it is classful routing. VLSM…
Q: Godwin Pharmaceuticals has a private web server for its corporate network that runs on a Linux…
A: Let's understand step by step : (1) SSH SSH stands for Secure Socket Shell which provides a…
Q: Question 3 Subnet the class C IP addresses 195.20.5.0 so that you have 22 subnets. a. What is the…
A: Subnet the class C IP addresses 195.20.5.0 so that you have 22 subnets. a. What is the subnet mask?…
Q: If you wanted to have 13 subnets with a Class C network ID, which subnet mask would you use? Select…
A: Subnetting is using the host part of an IP address to divide it into further small networks. The…
Q: Q.8. XYZ organization wants to create three subnets of their network (172.1.0.0/22) with the…
A: Given network 172.1.0.0/22 is using XYZ organization. Here the organization wants to create subnets…
Q: IPSec's Authentication Header in transport mode is used to secure an IP packet, whose payload is a…
A: Answer for the above question is option "(A).Time to Live" Explanation: A well-known IP process is…
Q: Attacker's 1. What is the address of www.evil.net? computer 2. Please send IP address of…
A: note: there is spelling mistake in the question i.e DNS poisoning. DNS poisoning is a technique used…
Q: Which of the following statements is NOT true? Question 46 options: IP Address Spoofing…
A: Static Packet Filter Firewalls are Stateless1. Filter one packet at a time, in isolation2. Cannot…
Q: Which of the following is the incorrect statement about the Internet Protocol version 4 (IPv4)?…
A: We are given 4 statements about IPv4 and we have to find out which one is not the characteristic of…
Q: Nmap is an example of: A. Wardriver B. Port scanner C. IP spoofer D. Wardialer
A: Nmap stands for network mapper. It is a network scanning software which can scan host and services…
Q: 9. Which of the following statements is true about P PP configuration and deployment? A. PPP can…
A: Which of the following statements is true about P PP configuration and deployment? A. PPP can…
Q: must you specify in your clients’ configurations to adhere to your subnetting scheme? a.…
A: Ans- The subnet mask which we must specify in our clients configurations for adhering to our…
Q: 1- Give the clas.... And default mask... ... for this IP address 225.1.0.0 2- How many host... 3-…
A: 1. Given that the class________________ And default mask _____________________ for this IP address…
Q: Q) Refer to the exhibit. Router R1 is configured as shown. An administrative user attempts to use…
A: R1 interface is enabled already with help of command telnet 10.10.10.1. So first option is…
Q: q37- Which statement identifies the DNS protocol? Select one: A. It transmits information using…
A: In which naming database internet domain names are locating and translating to the IP address,…
Q: Assume that the user having the IP address 11.22.33.44 is communicatingo the web server with IP…
A: Task :- Choose the correct option for given question.
Q: It is an application that captures TCP/IP data packets, which can maliciously be used to capture…
A: application that captures TCP/IP data packets are detailed in step2.
Q: 14) __________ refers to the combination of HTTP and SSL to implement secure communication between a…
A: B) HTTPS
Q: q23- Why is VLSM important to modern IP networks? Select one: A. Because it allows us to uniquely…
A: First lets understand what is VLSM: Variable length subnet masking : is a technique to divide…
Q: XYZ organization wants to create three subnets of their network (172.1.0.0/22) with the following…
A: Given network 172.1.0.0/22 is using XYZ organization . Here the organization wants to create subnets…
Q: Given the following IP address: 178.128.25.100. - This IP belongs to which class? - What is the…
A: Given: Given the following IP address: 178.128.25.100.- This IP belongs to which class?- What is the…
Q: ou are the network administrator for your organization. Your DHCP server (Server1) has a scope of…
A: Answer: 1.The Get-DhcpServerv4Lease cmdlet gets one or more lease records from the Dynamic Host…
Q: q16- A network has grown too large for technicians to configure network addresses. Which…
A: The solution is given below for the above-given question:
Q: XYZ organization wants to create three subnets of their network (172.1.0.0/22) with the following…
A: The Given ip address = 172.1.0.0 Subnet Mask Subnet mask was defined as a 32-bit address, that is…
Q: Which of the following represents the Well-known UDP Port Number for Trivial File Transfer Protocol?…
A: option a : 1023 Port number 1023 is Reserved for Operating system usage. Hence this option is…
Q: Server is used to offer IPV4 address pools for Class A, B, and C networks and contains an IP address…
A: Multicast Range - Used to allocate IP address ranges for Class D networks. Multicast scopes do not…
Q: What type of IPv6 address do you need to get on the Internet? a. Global unicast address b. Anycast…
A: To get on the internet, you need an address. That address should be unique and be your's only. This…
Q: Given an IP address 94.0.0.0/20, answer the following questions: I. What is the IP address class?…
A: 1) GIVEN IP ADDRESS CLASS IS CLASS A Internet addresses are allocated by the INTERNIC, the…
Q: u are investigating Network & Application layer attacks: Give three attack types in which hackers…
A: NOTE:“Since you have asked multiple questions, we will solve the first question for you. If you want…
Q: In tunnel mode, IPsec encapsulates and protects the entire IP packet, appends its own protocol…
A: Answer: In tunnel mode, the first bundle is embodied in another IP header. The addresses in the…
Q: XYZ organization wants to create three subnets of their network (172.1.0.0/22) with the following…
A: 172.1.0.0/22 Means number of network bits is 22 and number of host bits is 10 For subnetting we need…
Q: emet mpare packet format in tunnel mode and transport mode of IPse opose the packet generated by the…
A: IPSec protocol's focus is to provide or give security services and security groups for IP packets…
Q: Select correct alternatives: O DHCP provides LAN subnet mask. O DHCP is an application layer…
A: Given options on DHCP. To choose the correct option.
Q: You have been allocated a class C network address of 211.1.1.0 and are using the default subnet mask…
A: IP address: It is a required for a device to send any file over internet .The computer, mobile…
Q: QUESTION 16 Which of the following scenarios best describe a situation in which a user with an IP…
A: Note: According to given guideline to us, we are supposed to answer only the first question, Please…
Q: Given the IP address 180.15.128.0/20. Now, using the given IP address space create five subnets in…
A: Actually network is all devices communicate with each other.
Q: What is the maximum number of IP addresses that can be assigned to hosts on local subnet that users…
A: 255.255.255.224 can be written as, 11111111.11111111.111111111.11100000 this is the subnet mask,…
Q: 1. The most common method of securing e-commerce transmissions is dependent on a. the client…
A: the answer for above question is:
Q: Subject - Data communication networks How can you write the following IPv4 address 192.168.10.2 in…
A: 1) Given, IP address = 192.168.10.2 Converting the given IPv4 address 192.168.10.2 in IPv6 format =…
Q: Subnet the class C IP addresses 195.20.5.0 so that you have 22 subnets. What is the subnet mask?…
A: 1) The subnet mask is 255.255.255.248 /29 as it's an class C Address with only the last byte 0 so…
MCQ
A security analyst is hardening a web server that only host and run web service, which of following ports and protocols should be enabled?
a |
IMAP over port 143 |
|
b |
Telnet over port 23 |
|
c |
FTP over port 21 |
|
d |
HTTPS over port 443 |
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- As a consequence of which of the following layer 2 attacks, legitimate users will be denied access to their assigned IP addresses? O a. DHCP hunger O b. MAC address flooding O c. DHCP spoofing O Spoofing of ARP (d)Tobias wants to know more about software-defined networking, which separates the data plane from the control plane. Which of the following does not exist on the data plane? a. Firewall b. Application layer switch c. Routing d. Ethernet switch Alessio is evaluating the security of the virtual environment being used at your organization. Which of the following is a concern that Alessio should have? a. All hypervisors have the necessary security controls to keep out attackers. b. A VM can be used to test for potential malware. c. A snapshot of a VM's state can be saved for later use. d. Traditional security tools do not always adapt well to multiple VMs.Which of the following protocols can detect and correct link failures in milliseconds? a. TRILL b. SPB c. RSTP d. CARP Valentina is employed under the network management team at Iris Global Services, which is a software management firm. Following a recent hacking attempt at its office, the network administrator wants her to cross-check whether security precautions have been enabled on the STP interfaces so that the information transmitted by the BPDUs can be protected. On inspection, she discovers that the security precautions have not been configured. Analyze what Valentina should do in order to prevent a rogue switch or computer connected to one of these ports from hijacking the network's STP paths. a. Use the shutdown command to disable unused ports b. Use a root guard on the switches c. Use a BPDU filter to disable STPs d. Use a BPDU guard to block BPDUs You already have a running network in your organization, but…
- Which of these layer 2 attacks will prevent a genuine user from acquiring an IP address? O a DHCP starvation O b DHCP spoofing O c MAC address flooding O c. Spoofing of ARPCiara wants to connect to her corporate network from home using a private and secure connection to be private and secure. She wants the most secure option available. Which of the following VPN protocols would you recommend? a. IPsec/TLS b. L2TP/TLS c. PPTP d. L2TP/IPsec Luz is verifying that port security has been correctly configured on all of the switches in the organization. Which of the following is not one of the attacks he is trying to prevent? a. ARP poisoning b. MAC flooding c. DHCP snooping d. MAC address spoofing DDoS attacks are a major concern of any organization. What is one of the best options to stop a DDoS attack and simultaneously collect data on the attack? a. Honeynet b. Proxy server c. Honeypot d. Sinkholes Security devices are only as good as their configurations. A misconfigured device provides a false sense of security and potentially creates vulnerabilities that didn't exist prior to…Which layer 2 attacks can result in the denial of access to assigned IP addresses for legitimate users? The phenomenon of DHCP depletion MAC address flooding is a technique used in computer networking to overwhelm a switch's MAC address table. The topic of discussion is DHCP spoofing and ARP spoofing.
- You are investigating Network & Application layer attacks: Give three attack types in which hackers can leverage ICMP protocol? By crafting the IP header, and manipulating the ICMP message types, explain how hackers can use ICMP to conduct a DDoS attack (Amplification & Reflection). You work as a security analyst for a company having com.lb as domain name. You have inspected your firewall logs and found out that an infected PC was communicating with the below domain: u83ccf36d9f02e9ea79a9d16c0336677e4.to What type of DNS attack technique do you suspect the Malware is using? You have inspected your DNS entries and found out that the below DNS entry was added to your authoritative DNS server, without your permission: 6tR430-11Z.retail.com.lb What type of DNS attack technique is used in this security incident?Which Scopes in a DHCP server is used to provide IPV4 address pools to Class A, B, and C networks, and contains an IP address range assignment that includes the subnet mask, as well as exclusions and reservations? Super Scopes, I bow to your illustriousness; you make the Ordinary Perceptions Scopes of Multicast Scopes of Failure seem like amateurs.Which Scopes in a DHCP Server is used to offer IPV4 address pools for Class A, B, and C networks and contains an IP address range assignment that includes the subnet mask, exclusions, and reservations? * Standard Opinions Scopes for Failover Greetings Multicast Scopes, Super Scopes
- Which of the following layer 2 attacks will prevent an authorized user from receiving a lawful IP address? A MAC address flood B DHCP starvation O C DHCP spoofing O ARP spoofing d.Which Scopes is used in a DHCP Server to allocate IPV4 address pools for Class A, B, and C networks, and contains an IP address range assignment that includes the subnet mask, as well as exclusions and reservations? * Ordinary Perceptions Scopes of Multicast Scopes of Failure Super Scopes, I salute you.You are troubleshooting an issue and you think that it is a problem with the DHCP server configuration. Client get an IP address, they can ping IP addresses on the same network and on the internet, but they cannot pull up webpages. What is a likely cause of misconfiguration on the DHCP server? a.) incorrect ntp server b.) incorrect dns server c.) incorrect gateway d.) incorrect subnet mask