Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

network q Suppose filtering routers are arranged as in following figure:the prim

ID: 3845768 • Letter: N

Question


network q

Suppose filtering routers are arranged as in following figure:the primary firewall is R1. The administrator would like to enable Telnet to net 2 but not to hosts on net 1 and disallow Telnet connections from net 2 to net 1. The configuration of R1 is A. R1 blocks inbound traffic to the telnet port. B. R1 allows inbound traffic to the telnet port, unless the destination subnet is net2. C. R1 allows inbound traffic to the telnet port. D. R1 blocks inbound traffic to the telnet port, unless the destination subnet is net2. The configuration of R2 is A. R2 blocks inbound traffic to the telned port. B. R2 allows inbound traffic to the telned port. C. R2 allows inbound traffic to the telned port, unless the destination subnet is net 1. D. R2 block all telnet traffic from net 2 to net 1. The reason that some ISPs block cretin outbound traffic is A. to prohibit attacks launched by its own customers. B. to protect its own customers. C. to reduce load into its network D. to reduce load into its external links. SSL runs on layer between A. application layer and transport layer B. transport layer and network layer C. network layer and data link layer D. All of the above A HTTP interaction over a transport layer security (TLS) is A. HTTPS B. Secure sockets layer C. Pretty Good privacy D. Secure hypertext transfer protocol

Explanation / Answer

19. D is the correct answer. As we need to enable telnet for net2 hosts and each request from outside world has to pass from R1, so R1 must first check the destination address, if it is for net2, then it should allow the telnet request, else block it.

20. C is the correct answer. As we need to enable telnet for net2 hosts and each request from outside world and R1 has to pass from R2 to reach net2, so R2 must first check the destination address, if it is for net1(i.e. request is going form net2 to net1), then it should block the telnet request, else allow it, So that net2 hosts can have telnet request enables.

21. A is the answer. to protect the outer network from possible DDoS attack that can be launched by its own customer.

22. A is the answer, it runs between Transport layer and application layer and runs above the transport layer and network layer.

23. A is the answer.. HTTP request secured by TLS is called HTTPS.