Module 4 IT Fundamentals
To capture network transmissions
For what purpose is a network sniffer used?
Sniffing
Monitoring network communications to collect information about the network and collect the content of the network packets is known as:
Windows updates, firewalls, spyware, and antivirus protections
Network Access Protection (NAP) is able to check the status of:
Stateful inspection
Which firewall inspection method logs outgoing connections and checks incoming traffic against that log?
Stateful software firewall
Windows firewall is a:
Honeypot
A computer that is designed to entice hackers to attack is known as a:
To allow corporate users to securely access your internal network from a remote location
For what purposes would you use a VPN?
To provide protection for an individual client
In which situation would you use a Class 1 firewall?
Are configured from software included with the operating system
Software firewalls:
A NAP healthy policy server
To deploy Network Access Protection (NAP), you must have:
Encapsulates packets of one protocol inside another protocol
Tunneling:
To protect the network by restricting incoming and outgoing network traffic
What is the primary purpose of a firewall?
Source and destination IP addresses
What kind of data does a stateless firewall use to determine which network frames to allow or block?
Validating and requesting a health certificate for compliant clients
Which is the role of a Health Registration Authority (HRA) in Network Access Protection (NAP)?
A honeypot
Which is used for the sole purpose of Intrusion detection?
A Firewall
Which is used to implement packet filtering of packets sent from and received on the network?
Digital signature
Which is used to validate DNSSEC responses?
ESP
Which of the following is an IPsec protocol that provides data confidentiality in addition to authentication?
DNSSEC
Which uses digital signatures to provide security for DNS communications and helps minimize the likelihood of man-in-the-middle attacks?
encrypting data transmitted over the network
Which would reduce the likelihood of a sniffer attack?
DNSSEC
You are a network administrator for your organization. The corporate help deck receive several customer complaints that visits to your organization's public website redirected them to a known malware site. You need to mitigate this type of network attack. Which technology should you implement?
Group Policy settings
You are setting up a server isolation in an Active Directory domain to limit access to select domain members only. You will need to configure:
Windows Vista, Windows 7, Windows XP SP3 or later.
You have a server running Windows Server 2008. You want to deploy NAP to enforce compliance for client computers on the network. Which client operating systems are supported?
DMZ
You have a web server on your network that will be Internet facing. You need to allow external users to access the Web server, but protect the internal network. What should you use?
NAP
You need to ensure that only specific computers are allowed to access specific network resources. What should you use?
Virtual local area network (VLAN)
You want to configure clients and servers in different geographic locations on your network as if they were all part of the same subset. You need to set up a:
A perimeter network
You want to provide public access to a Web server. Visitors to the Web server should not have access to your internal network. You need to configure:
Apply Windows XP SP3
Your network includes several client computers running Windows XP Service Pack (SP) 2. Which action must you take (at minimum) before the clients can be made Network Access Protection (NAP) compliant?