Basic Concepts of Networking
Q. What is Biometric authentication?
Biometric authentication uses the
biological characteristics of user to authenticate the user. The Biological
characteristics that can be authenticated are fingerprints, retina, and voice
and so on.
Q.
What is smart card?
A Smart card is pocket sized used for
authenticating users. Smart cards store digital information about the user
credentials in their Integrated Circuits(IC).
Q. What
do you understand by Wi-Fi connection?
A Wi-Fi connection is used to provide
wireless access to local Area Networks (LAN).
Q1. Which tasks should be performed to
analyze the security requirements of the organization?
Ans: - Gather
the Business requirements.
Identify
the business driver for security design.
Analyze
the management structure of the organization.
Q2. Identify the points that need to be
considered while analyzing the technical requirements of an organization.
Ans:- The points to be
considered while analyzing the technical requirements of an organization are :-
Operating system
and software used
Hardware
compatibility.
Interoperability
limitations.
Q3. Administrative
Controls : Remote Access Policy.
Technical Control : Customer Data Tracking System.
Physical Control : Access to the sever room.
Q4. Which are the spheres of security that provide a framework to
design robust security?
Ans: The spheres of
security that provide a framework to design robust security are people,
processes, and technology.
Q5. Which
of the following security policies help in conducting risk assessment and
ensuring adherence to the security policies?
Ans:- 1. Audit
vulnerability scanning policy
2. Analog/ISDN line policy.
3. Server security policy.
4. Database credentials coding policy.
7. Zotob is a computer
worm that exploits plug and play security vulnerability of Windows 2000. This
worm spreads by using the TCP port 445.
8. MS05-039 security
patch was released for a vulnerability found in the plug and play feature of
windows operating system. Using this vulnerability, malicious users can
remotely excute a malicious code and increase their privileges.
Q9. Which user is authorized to access an account but misuses the
assigned privileges.
Ans: - Misfeasor.
10. Which malicious program is embedded in another program?
Ans: - Logic Bomb.
11. For the given
threats, identify the category of threats based on the STRIDE Model.
1.
A user logs on as a normal user
and gains administrative rights: ---------------- Elevation
of Privilege.
2.
A user gains access to
confidential information and passess it to competitors. -----------Information Disclosure.
3.
The attacker can overload a
server by running numerous server applications on it. As a result, a legitimate
user is denied access to a required services on the network.-------
Denial of Service
4.
A user gains access to the
Employees database of an organization and modifies the salary structure of the
employees. ------------Tampering.
5. An IT operation executes gains access to the accounts database of
the organization by disguising himself as an accounts executive. ----------Spoofing Identity.
12. Modeling refers to categorization of security threats
on the basis of the the frequency of occurrence
and the impact on the network.
13. Transfer is a strategy where the responsibility of
mitigating the risk is assigned to another party who has the required
expertise.
14. Cryptography key specifies the method of transforming
a plain text into coded text during encryption and vice versa during
decryption.
15. In
windows server 2003 Active Directory Domain the primary authentication protocol
is Kerberos version 5.
This protocol support authentication across the platforms, such as Linux and
Unix.
16. In
Linux, Kerberos Version 5 is a trusted, third party network authentication
meted; this method restricts the use of clear text passwords. Clear text
passwords are sequences of characters that are unencrypted and are also called
plain text password.
17. The krb5-server and
krb5-workstation packages need to be installed on the Kerberos server and
clients, respectively for implementing Kerberos authentication.
18. Windows Server 2003
uses LAN Manager (LM) authentication to provide backward compatibility for
Windows 95 and windows 98 computers.
19. Use
NTLM protocol only in a situation when Kerberos authentication cannot be done.
20. The
NTLM authentication method is not available in Linux. However, Linux provides
support for the Linux clients to be authenticated by the Windows NTLM
authentication protocol. The perl-Authen-NTLM-0.31-1.1.fc2.rf.noarck.rpm
package is used by Linux clients for NTLM authentication.
21. Certificate templates
define the format and content of a certificate that are issued by the windows
Server 2003 CA.
22. MD
5 was developed by Professor
Ronald
Q. What do you mean by IP Sec.?
IP sec is an standard open framework
designed to provide secure and private communication over IP network.
Q. What stand for IAS?
Internet Authentication Services (IAS) is an
authentication services to centrally mange and control remote access to a
network.
Q. What is Firewall?
Firewall is a security mechanism to protect
the data or network from the threats which can be a pc or a part of
organization network.
Q. What do you understand by WINS?
WINS is a
services that enables you to resolves NetBIOS names to IP address.
Q. What do you understand by DHCP?
DHCP is a
protocol used to assign IP address dynamically from available IP address.
Q. What do you understand by DNS?
DNS is a name
resolution services that resolves Host name to IP address.
Q. What is Hub?
A hub is a
device that transmits information from one network to another.
Q. What is protocol?
The set of standard,
rules and conventions are called protocols.
Q. What do you
understand by Reconciling?
Reconciling is the process of matching the
DHCP data value against the DHCP registry value to verify the correctness of
DHCP data value.
Domain Controller (DC):- It is
the physical components of active Directory and it is used to control and
manage the domain in an organization forest.
Disk Quotas: - It is used to
specify fixed disk space for each user.
Domain represents a network of a
computer that is connected to a central server known as DC.
IIS: - Internet Information
Services are software services that provide support to creating, configuring
and managing web sites.
Firmware is the combination of
hardware and software.
RADIUS: - Remote Authentication
Dial-in Service is an authentication service used to authenticate a network
access client before allowing access to network resources.
DHCP Scope: - it refers to the
range of valid IP address that a DHCP server assigns to the clients.
Front End Server: - It does not
host any mailboxes or public folder stores, It just accepts requests from
clients and sends these requests to the appropriate back-end Server for
processing.
Public Folders: - It is a central repository of various types of information such as
messages text documents and multimedia files.
E-mail users: - The employees who communicate within and outside the organization
through e-mail are called e-mail users.
Routing Group: - It is a logical collection of messaging servers in an organization
that share the high bandwidth connectivity.
Two way Trust relationship: - it allows you to read information such as user accounts , group
accounts and mailboxes access control list from the WIN NT Security account
manager (SAM) database and then write the information to the Active Directory.
Migration: - It is the process of moving user’s information and mailboxes from
one servers to another servers.
Active Directory
migration Tool (ADMT) :- It is a Microsoft management
console snap-in that ensure clean and error free migration to the WIN Server
2003 Active directory . The ADMT Snap-in
migrates the users ,computers trusts and groups to the active directory.
Virtual Memory: - It refers to the space allocated on the hard disk to counter the
low physical memory situations.
Q. What is Default gateway?
It is the device
on a local network that locates all networks ID on the internet.
Comments
Post a Comment