Question 1 In most cases, which of the following methods would you NOT want to u
ID: 3708517 • Letter: Q
Question
Question 1
In most cases, which of the following methods would you NOT want to use with an IDS
SPAN port
Network Tap
Network Hub
An unconfigured switch port
Question 2
Host based security is not needed when you implement Defense in Depth.
True
False
Question 3
How could a corporate user with an unauthorized Wireless USB CDMA adapter from Verizon create a backdoor into the network?
CDMA broadcasts in plaintext.
Since it is easy to do, an attacker is likely to hack the CDMA signal and intercept wireless packets.
This would not create a backdoor since they are two separate networks.
This would inadvertently create a network bridge that could allow access to content behind the business's security controls.
SPAN port
Network Tap
Network Hub
An unconfigured switch port
Explanation / Answer
SOLUTION:-
(1) An unconfigured switch port
Reason:- Becasue It will not allow access for all packets in order to monitoring by IDS.
(2) False
Reason:- Because Host based security is required when we implement Defence in Depth in order to prevent from the attack. It tells us about missing patches, security update, week settings of passwords and provides support in terms of infiltrate detection, content filter with antivirus software, enabling firewalls and VPN, services of penetrability management.
(3) Since it is easy to do, an attacker is likely to hack the CDMA signal and intercept wireless packets.
==================================================================================
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.