When using IPTables, the ability to specify all possible IP addresses in a rule is included; which of the following are correct syntax for specifying all possible IP addresses?
Answer : B, C
Your company has created it's security policy and it's time to get the firewall in place. Your group is trying to decide whether to build a firewall or buy one. What are some of the benefits to purchasing a firewall rather than building one?
Answer : A, B, E
You are configuring a new custom IPSec policy on your Windows Server 2003 machine. On the rules tab, you find the three default options under the IP Filter List. What are these three default options?
Answer : C, D, E
You have been working with Snort, on your Windows Server 2003, for sometime as a packet capture tool, and now wish to connect Snort to a database on your server. You install MySQL as the database, and are ready to configure Snort. If the database is named: snortdb1, has a user name of: snort, and a password of: snortpass, what is the configuration line you need to add to Snort?
Answer : E
During a network analysis session, you capture several TCP/IP sessions. You focus your analysis on the IP Headers. In an IP Header, what is the function of the first four bits?
Answer : D
Which of the following is a potential weakness of a commercial firewall product that is installed on a hardened machine?
Answer : E
In order to perform promiscuous mode captures using the Wireshark capture tool on a Windows Server 2003 machine, what must first be installed?
Answer : C