A. RC2
B. RC4
C. RC6
D. RC5
A. The ICMP Time Exceeded message, with the threat of a denial-of-service attack
B. The TCP three-way handshake, with the threat of a man-in-the-middle attack
C. The DNS name query, with the threat of cache poisoning
D. The SIP three-way handshake, with the threat of a buffer overflow
A. A packet sniffer
B. A network switch
C. A vulnerability scanner
D. An intrusion-detection system
A. Your ISP
B. Firewall logs
C. Router logs
D. Ping
A. restricted access policy.
B. proxy server policy.
C. strong password policy.
D. firewall configuration policy.
A. iptables -A INPUT -p icmp -s 10.100.100.0/24 -d 0/0 -j DROP
B. iptables -A INPUT -p icmp -s 10.100.100.0/255.255.255 -d 0/0 -j KILL
C. iptables - INPUT -p icmp -s 0/0 -d 0/0 -j KILL
D. iptables -A INPUT -p icmp -s 0/0 -d 0/0 -j DROP
A. DES
B. X.509
C. Diffie-Hellman
A. You would be misdirected to a fraudulent Web site without your knowledge or consent.
B. The files on your boot sector would be replaced with infected code.
C. You would be unable to access a legitimate service, such as establishing a network connection.
D. A virus would be unleashed on your system at the time the SYN flood or malformed packet was received.
A. Collection of information for properly configuring the firewall
B. Ability to recover quickly from a natural or man-made disaster
C. Ability to identify common attacks
D. Identification of highest-priority systems to protect
A. Because they usually lie outside the broadcast domain
B. Because they use ports below 1023 and many firewalls are not configured to block this traffic
C. Because they use ports above 1023 and many firewalls are not configured to block this traffic
D. Because they are susceptible to VLAN hopping