Securing Communication & other Infrastructure
SLIP
PPTP
POP3
PPP
PPTP
L2TP
HTTP
NNTP
Authenticating server
RADIUS Server
HTTP Server
File Server
PPTP
IPSec
Kerberos
Certificate
TACACS
RADIUS
IAS
None of the above
Run regular vulnerability checks
Update Virus definitions
Re-install OS at regular frequency
Disk management should be regular
Worms
Trojan horse
Boot Record virus
EXE file virus
Scan before downloading
Scan before sending
Scan before opening
Scan after receiving
21
20
25
119
Verifies if destination domain is self or not before transmitting a mail
Verifies if recipient is from local domain or not before receiving an email
Verifies if email is infected or not
None of the above
It requires line of sight
It requires the same radio frequency at the transmitting and receiving end.
It is least secure.
Interception is possible if the tapping devices is also in the line of sight
Interception is possible if the tapping device is also tuned to the same radio frequency as the main communicating devices.
It steps us AC voltage
It steps down DC voltage
It modulates and demodulates signals for the Computer and the telephone line.
It converts Analog signals to digital and vice versa.
Physical layer
Datalink layer
Network Layer
None of the above
Wireless 802.11b and g
Microwave
Blue tooth
Radio frequency
Stateful Inspection
Port filtering
Packet filtering
Application filtering
Proxy
Router
PC
Switch
It maintains a state table
It maintains a routing table
It functions on the network layer
It functions on the application layer.
True
False
Network policy
Firewall policy
Access policy
None of the above
Any any
Deny all
Permit all
None of the above
Protocol information
Source address
Destination address
No of bytes in the header
Block port numbers 20 and 21 on the external interface for incoming connections
Block port numbers 20 and 21 on the internal interface.
Block port numbers 67 and 68 on the external interface for incoming connections
Block port numbers 67 and 68 on the internal interface
True
False
Perform OS hardening by blocking all access to this server
Perform OS hardening by verify and terminating all un used service
Regularly check for unused usernames and disable or delete them.
Ensure you are running a vulnerability check on this server at regular intervals.
Do not host a database server on the same server as your web server.
Do not host a database server on a server based system
Employ a three-tier model
Employ a centralized administration model.