Beruflich Dokumente
Kultur Dokumente
Question1. Why Does Active Ftp Not Work With Network Firewalls?
Answer :
When a user initiates a connection with the FTP server, two TCP connections are
established. The second TCP connection (FTP data connection) is initiated and
established from the FTP server. When a firewall is between the FTP client and server,
the firewall would block the connection initiated from the FTP server since it is a
connection initiated from outside. To resolve this, Passive FTP can be used or the
firewall rule can be modified to add the FTP server as trusted.
Question2. Which Feature On A Network Switch Can Be Used To Prevent
Rogue Dhcp Servers?
Answer :
DHCP Snooping
Question3. Which Feature On A Cisco Ios Firewall Can Be Used To Block
Incoming Traffic On A Ftp Server?
Answer :
Extended ACL.
Question4. Name One Secure Network Protocol Which Can Be Used Instead
Of Telnet To Manage A Router?
Answer :
SSH
Question5. Provide A Reason As To Why Https Should Be Used Instead Of
Http?
Answer :
HTTP sends data in clear text whereas HTTPS sends data encrypted.
Question6. How Can You Prevent A Brute Force Attack On A Windows Login
Page?
Answer :
Setup a account lockout for specific number of attempts, so that the user account would
be locked up automatically after the specified number.
Question7. In An Icmp Address Mask Request, What Is The Attacker Looking
For?
Answer :
The attacker is looking for the subnet/network mask of the victim. This would help the
attacker to map the internal network.
Question8. Why Is Ripv1 Insecure In A Network?
Answer :
RIPv1 does not use a password for authentication as with RIPv2. This makes it possible
to attackers to send rogue RIP packets and corrupt the routing table.
Question9. Which Feature On A Network Switch Can Be Used To Protect
Against Cam Flooding Attacks?
Answer :
Port-Security feature can be used for the same. In a cam flooding attack, the attacker
sends a storm of mac-addresses (frames) with different values. The goal of the attacker
is to fill up the cam table. Port-Security can be used to limit the number of mac-
addresses allowed on the port.
Question10. Which Protocol Does Https Uses At The Transport Layer For
Sending And Receiving Data?
Answer :
TCP