Chapter 7 Review Questions: Except

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 5

Security+ Guide to Network Security Fundamentals, 2e Solutions 7-1

Chapter 7 Review Questions

1. The File Transfer Protocol (FTP) can be accessed by each of the following
except ___________________.
a. Web browser
b. FTP client
c. command line
d. LPTP server

2. Another name for anonymous FTP is __________________.


a. blind FTP
b. free user FTP
c. Freenet
d. Unannounced FTP

3. The most widely-deployed tunneling protocol is ____________.


a. L2TP
b. RADIUS
c. PPP
d. PPTP

4. Each of the following is a characteristic of the Layer 2 Tunneling Protocol


(L2TP) except ________________.
a. It merges the features of PPTP and Layer 2 Forwarding Protocol (L2F).
b. It requires a TCP/IP network.
c. It can be implemented on devices like routers.
d. It can support advanced encryption methods.

5. Each of the following is an authentication technology except _________.


a. IEEE 802.11b
b. RADIUS
c. TACACS+
d. IEEE 802.1x
Security+ Guide to Network Security Fundamentals, 2e Solutions 7-2

6. The 802.1x protocol is based on the Extensible Authentication Protocol


(EAP), which is an extension of PPP. True or False?

7. One of the advantages of the RADIUS architecture is that it supports


authentication and authorization as well as auditing functions. True or false?

8. Similar to RADIUS, Terminal Access Control Access Control System


(TACACS+) is an industry standard protocol specification that forwards
username and password information to a centralized server. True or false?

9. Secure Shell (SSH) is a Windows-based command interface and protocol that


replaces three Windows utilities: wlogin, wcp, and wsh. True or false?

10. IP Security (IPSec) functions at Layer 1 of the OSI model. True or false?

11. One of the ways to reduce the risk of FTP vulnerabilities is to use _____.
secure FTP

12. IP Security (IPSec) confidentiality is performed by the _____ protocol.


Encapsulating Security Payload (ESP)

13. A(n) _____ takes advantage of using the public Internet as if it were a private
network. virtual private network (VPN)

14. A(n) _____is a database that is stored on the network itself that contains all
the information about users and their privileges to network resources.
directory service

15. _____ is the security layer of the Wireless Access Protocol (WAP) and
provides privacy, data integrity, and authentication. Wireless Transport
Layer Security (WTLS)

16. Explain how the three elements of the IEEE 802.1x standard function.
A networking supporting the 802.1x protocol consists
of three elements. The supplicant is the client device,
like a desktop computer or PDA, which requires secure
network access. The supplicant sends the request to
an authenticator that serves as an intermediary
device. An authenticator can be a network switch or a
wireless device. The authenticator sends the request
from the supplicant to the authentication server. The
authentication server accepts or rejects the
supplicants request and sends that information back
to the authenticator, which in turn grants or denies
Security+ Guide to Network Security Fundamentals, 2e Solutions 7-3

access to the supplicant. One of the strengths of the


802.1x protocol is that the supplicant never has direct
communication with the authentication server. This
minimizes the risk of attack on the authentication
server, which contains valuable login data for all users.

17. What are the advantages of IPSec functioning at a lower layer of the OSI
model?

Different security tools function at different layers of the Open System


Interconnection (OSI) model. Tools such as Secure/Multipurpose Internet
Mail Extensions (S/MIME) and Pretty Good Privacy (PGP) operate at
the Application layer, while Kerberos functions at the Session layer. The
advantages of having security tools function at the higher layers like the
Application layer is that these tools can be specifically designed to protect
that application. However, protecting at this layer may require multiple
security tools, perhaps even as many as one per each application. Secure
Socket Layers (SSL)/ Transport Layer Security (TLS) operate at the
Session layer. The advantage of operating at this level is that more
applications can be protected, yet minor modifications may have to be
made to the application. An even improved functionality can be achieved
if the protection is even lower in the OSI layer. If the protection was at
the Network layer, it can protect a wide range of applications with no
modifications needed. Even applications that are ignorant of security,
such as a legacy MS-DOS application, can still be protected. This is the
level at which IPSec functions.

18. What are the two IPSec encryption modes? Give an example that illustrates
why two modes are necessary.
Security+ Guide to Network Security Fundamentals, 2e Solutions 7-4

IPSec supports two encryption modes: Transport and Tunnel. Transport


mode encrypts only the data portion (payload) of each packet yet leaves
the header unencrypted. The more secure Tunnel mode encrypts both the
header and the data portion. IPSec accomplishes transport and tunnel
modes by adding new headers to the IP packet. The entire original packet
(header and payload) is then treated as the data portion the new packet.
Because tunnel mode protects the entire packet, it is generally used in a
network gateway-to-gateway communication. Transport mode is used
when a device must see the source and destination addresses in order to
route the packet. For example, a packet sent from a client computer to
the local IPSec-enabled firewall would be sent in transport mode in order
for the packet to be transported through the local network. Once it
reached the firewall it would be changed to tunnel mode before being sent
onto the Internet. The receiving firewall would then extract, decrypt and
authenticate the original packet before it is routed to the final destination
computer.

19. Explain the process of how Internet data can be displayed on a cell phone.

With standard computers, Web browser software makes a request to the


World Wide Web file server for a Web page. This page is transmitted
back to the Web browser in HTML. When a Web server sends a Web
page back to a computer, it is sending only HTML code. The Web
browser is responsible for interpreting that code and displaying the
results on the screen. WAP follows this standard Internet model with a
few variations. A WAP cell phone runs a tiny browser program called a
microbrowser that uses Wireless Markup Language (WML) instead of
HTML. WML is designed to display text-based Web content on the small
screen of a cell phone. However, since the Internet standard is HTML, a
WAP Gateway (sometimes called a WAP Proxy) must translate between
WML and HTML. The WAP Gateway takes the Web page sent from the
Web server in HTML code and changes it to WML language before
forwarding it on to the cell phone.

20. What is the wired equivalent privacy (WEP) and what is its weakness?
Security+ Guide to Network Security Fundamentals, 2e Solutions 7-5

The wired equivalent privacy (WEP) is an optional configuration for


WLANs that encrypt packets during transmission to prevent attackers
from viewing their contents. WEP uses shared keys, meaning that the
same key for encryption and decryption must be installed on the AP as
well as each wireless device. WEP can also be used for authentication.
When a wireless devices attempts to connect to a WLAN the AP sends the
device 128 bytes of challenge text. The client encrypts the challenge text
with its WEP key and returns it to the AP, which compares the encrypted
text with its own encrypted version of the challenge text with its WEP
key. If the two match, then the client has the correct WEP key and is
approved. The vulnerability with WEP is that the IV is not properly
implemented. Every time a packet is encrypted it should be given a
unique IV. Yet because the IV is only 24 bits in length, it can have only
16,777,215 possible values. A WLAN transmitting at 11Mbps will
transmit approximately 700 packets each second. This means that in less
than seven hours all of the 16 million IV values have been used and it
must start repeating itself. Because the IVs are transmitted in clear text,
an attacker can capture packets and see when the IV starts repeating.
With the information he or she is then able to crack the encryption.

You might also like