To increase the security of the network, you have decided to implement a solution using authentication tokens. You are
explaining this to a coworker who is not familiar with tokens. What are Authentication Tokens?
Answer : E
You are going to add another computer to the pool that you use for detecting intrusions. This time you are making a customized
Snort machine running on Windows 2000 Professional. Prior to running Snort you must install which of the following programs?
Answer : D
You have finished configuration of your ISA server and are in the section where you secure the actual server itself. Of the three
options presented to you, which of the following answer best describes the Limited Services option?
Answer : A
You have been hired at a large company to manage network security issues. Prior to your arrival, there was no one dedicated to
security, so you are starting at the beginning. You hold a meeting and are discussing the main functions and features of network
security. One of your assistants asks what the function of Authentication in network security is. Which of the following best describes
Authentication?
Answer : E
You are configuring your new IDS machine, where you have recently installed Snort. While you are working with this machine,
you wish to create some basic rules to test the ability to log traffic as you desire. Which of the following Snort rules will log any tcp
traffic from any host other than 172164050 using any port, to any host in the 100100/24 network using any port?
Answer : B
You are using ISS Internet Scanner to run a vulnerability check in your network. You have implemented some new computers, and
are creating a new custom policy using the built-in Wizard. When creating a new policy from scratch, through the wizard, which base
policy will you select?
Answer : E
You are using ISS to scan your network as part of your Intrusion Detection System. How often does ISS recommend running a
scan for backdoors?
Answer : B