Chapter 14 Ans Network +

Submitted by: Submitted by

Views: 10

Words: 2029

Pages: 9

Category: Science and Technology

Date Submitted: 11/22/2015 06:37 AM

Report This Essay

11/17/2015

Answers: Chapter 14

Network+ Guide to Networks, 4 th Edition

Chapter 14 Solutions

Review Questions

 

1. A hacker posing as a package delivery service employee walks into your company's offices and

convinces the receptionist to let him into the computer room, where he claims a package is waiting for his

pickup. What security-threatening strategy is the hacker attempting?

a. social engineering

 

2. You work for a retailer that sells household goods online. The company has decided to redesign its

network for better security. Included in this redesign is the addition of a new firewall. Assuming the

firewall is placed between the Internet connection and the Web server, which of the following should be

included in the firewall's configuration so that customers can still reach the Web site?

c. Allow incoming TCP-based transmissions to port 80.

 

3. Which two of the following would typically be used for authenticating via a network operating system?

b. user name

e. password

 

4. Which of the following is the most secure password?

c. !t1z0GS557x^^L

 

5. If you upgrade a 24-port hub that serves one of your organization's workgroups to a 24-port switch for

better performance, how have you also improved security?

d. You have prevented the possibility of one client eavesdropping on the transmissions issued by another

client connected to the switch.

 

6. You are alerted that suddenly 100% of the resources on your two core routers are being used and no

legitimate traffic can travel into or out of your network. What kind of security attack are you most likely

experiencing?

a. denial-of-service

http://content.hccfl.edu/faculty/michaelmoats/cgs1550/answers/answers14.htm

1/7

11/17/2015

Answers: Chapter 14

 

7. What type of device guards against an attack in which a hacker modifies the IP source address in the

packets she's issuing so that the transmission appears to belong to your network?

b. proxy server

 

8. Which of...