Basic Concepts of Networking

Q. What is Biometric authentication?

Biometric authentication uses the biological characteristics of user to authenticate the user. The Biological characteristics that can be authenticated are fingerprints, retina, and voice and so on.

 

Q. What is smart card?

A Smart card is pocket sized used for authenticating users. Smart cards store digital information about the user credentials in their Integrated Circuits(IC).

 

Q. What do you understand by Wi-Fi connection?

A Wi-Fi connection is used to provide wireless access to local Area Networks (LAN).

 

Q1.      Which tasks should be performed to analyze the security requirements of the organization?

Ans: -  Gather the Business requirements.

            Identify the business driver for security design.

            Analyze the management structure of the organization.

 

Q2.      Identify the points that need to be considered while analyzing the technical requirements of an organization.

Ans:-   The points to be considered while analyzing the technical requirements of an organization are :-

            Operating system and software used

            Hardware compatibility.

            Interoperability limitations.

 

Q3.      Administrative Controls         :           Remote Access Policy.

            Technical Control                   :           Customer Data Tracking System.

            Physical Control                     :           Access to the sever room.

 

Q4.      Which are the spheres of security that provide a framework to design robust security?

Ans:     The spheres of security that provide a framework to design robust security are people, processes, and technology.

 

 

Q5.      Which of the following security policies help in conducting risk assessment and ensuring adherence to the security policies?

Ans:-   1.         Audit vulnerability scanning policy

            2.         Analog/ISDN line policy.

            3.         Server security policy.

            4.         Database credentials coding policy.

 

7.         Zotob is a computer worm that exploits plug and play security vulnerability of Windows 2000. This worm spreads by using the TCP port 445.

 

8.         MS05-039 security patch was released for a vulnerability found in the plug and play feature of windows operating system. Using this vulnerability, malicious users can remotely excute a malicious code and increase their privileges.

 

Q9.      Which user is authorized to access an account but misuses the assigned privileges.

Ans: -  Misfeasor.

 

10.       Which malicious program is embedded in another program?

Ans: -  Logic Bomb.

 

 

 

11.       For the given threats, identify the category of threats based on the STRIDE Model.

 

1.      A user logs on as a normal user and gains administrative rights: ---------------- Elevation of Privilege.

 

2.      A user gains access to confidential information and passess it to competitors. -----------Information Disclosure.

 

3.      The attacker can overload a server by running numerous server applications on it. As a result, a legitimate user is denied access to a required services on the network.-------

Denial of Service

 

4.      A user gains access to the Employees database of an organization and modifies the salary structure of the employees. ------------Tampering.

 

5.      An IT operation executes gains access to the accounts database of the organization by disguising himself as an accounts executive. ----------Spoofing Identity.

 

12.       Modeling refers to categorization of security threats on the basis of the the frequency of   occurrence and the impact on the network.

 

13.       Transfer is a strategy where the responsibility of mitigating the risk is assigned to another party who has the required expertise.

 

14.       Cryptography key specifies the method of transforming a plain text into coded text during encryption and vice versa during decryption.

 

15.       In windows server 2003 Active Directory Domain the primary authentication protocol is Kerberos version 5. This protocol support authentication across the platforms, such as Linux and Unix.

 

16.       In Linux, Kerberos Version 5 is a trusted, third party network authentication meted; this method restricts the use of clear text passwords. Clear text passwords are sequences of characters that are unencrypted and are also called plain text password.

 

17.       The krb5-server and krb5-workstation packages need to be installed on the Kerberos server and clients, respectively for implementing Kerberos authentication.

 

18.       Windows Server 2003 uses LAN Manager (LM) authentication to provide backward compatibility for Windows 95 and windows 98 computers.

 

19.       Use NTLM protocol only in a situation when Kerberos authentication cannot be done.

 

20.       The NTLM authentication method is not available in Linux. However, Linux provides support for the Linux clients to be authenticated by the Windows NTLM authentication protocol. The perl-Authen-NTLM-0.31-1.1.fc2.rf.noarck.rpm package is used by Linux clients for NTLM authentication.

 

21.       Certificate templates define the format and content of a certificate that are issued by the windows Server 2003 CA.

 

22.       MD 5 was developed by Professor Ronald

 

 

Q.        What do you mean by IP Sec.?

IP sec is an standard open framework designed to provide secure and private communication over IP network.

 

Q.        What stand for IAS?

 Internet Authentication Services (IAS) is an authentication services to centrally mange and control remote access to a network.

 

Q. What is Firewall?

Firewall is a security mechanism to protect the data or network from the threats which can be a pc or a part of organization network.

 

Q.        What do you understand by WINS?

WINS is a services that enables you to resolves NetBIOS names to IP address.

 

Q.        What do you understand by DHCP?

DHCP is a protocol used to assign IP address dynamically from available IP address.

 

Q.        What do you understand by DNS?

DNS is a name resolution services that resolves Host name to IP address.

 

Q.        What is Hub?

A hub is a device that transmits information from one network to another.

Q.        What is protocol?

The set of standard, rules and conventions are called protocols.

 

Q.        What do you understand by Reconciling?

Reconciling is the process of matching the DHCP data value against the DHCP registry value to verify the correctness of DHCP data value.

 

 

Domain Controller (DC):- It is the physical components of active Directory and it is used to control and manage the domain in an organization forest.

 

Disk Quotas: - It is used to specify fixed disk space for each user.

 

Domain represents a network of a computer that is connected to a central server known as DC.

 

IIS: - Internet Information Services are software services that provide support to creating, configuring and managing web sites.

 

Firmware is the combination of hardware and software.

 

RADIUS: - Remote Authentication Dial-in Service is an authentication service used to authenticate a network access client before allowing access to network resources.

 

DHCP Scope: - it refers to the range of valid IP address that a DHCP server assigns to the clients.

 

 

Front End Server: - It does not host any mailboxes or public folder stores, It just accepts requests from clients and sends these requests to the appropriate back-end Server for processing.

 

Public Folders: - It is a central repository of various types of information such as messages text documents and multimedia files.

 

E-mail users: - The employees who communicate within and outside the organization through e-mail are called e-mail users.

 

Routing Group: - It is a logical collection of messaging servers in an organization that share the high bandwidth connectivity.

 

Two way Trust relationship: - it allows you to read information such as user accounts , group accounts and mailboxes access control list from the WIN NT Security account manager (SAM) database and then write the information to the Active Directory.

 

Migration: - It is the process of moving user’s information and mailboxes from one servers to another servers.

 

Active Directory migration Tool (ADMT) :- It is a Microsoft management console snap-in that ensure clean and error free migration to the WIN Server 2003 Active directory . The ADMT Snap-in migrates the users ,computers trusts and groups to the active directory.

 

Virtual Memory: - It refers to the space allocated on the hard disk to counter the low physical memory situations.

 

Q. What is Default gateway?

It is the device on a local network that locates all networks ID on the internet.

 

 

Comments

Popular posts from this blog

Understand the Telecom Basics

Understand the Basic Networking concepts