Network Security Accelerated Session G, 2007CIT461 Review QuestionsNetwork Security Review questions.wpdNTC Feb 28, 2007Week 3 - Windows Security1. Understand the purpose and usage of each of the following command-lineutilities:a. pingb. ipconfigc. netd. netstate. nmapf. nessus2. Briefly describe each of the following layers of protection; give an examplewhere appropriatea. Managing usersb. Hardening Hostsc. VLAN separationd. Server separatione. WAN separationf. Customer separationg. Internet Perimeter3. How does the level of security on a system impact the system user’sconvenience?4. What are the four Microsoft recommendations mentioned in the text?5. What are the vulnerabilities addressed by each of the following systemhardening actions?a. Removing unneeded servicesb. Removing extra applicationsc. Finding and Closing unneeded portsd. Removing unneeded sharese. Installing a personal firewallf. Disabling autorung. Reviewing File Permissions6. Why should we use NTFS instead of the FAT file system?7. What is Pretty Good Privacy?8. What is an Intrusion Detection System?9. What is SSH and what should it be used in lieu of?10. Briefly describe how each of the following attacks operates:a. Virusesb. Wormsc. Trojan HorsesNetwork Security Accelerated Session G, 2007CIT461 Review QuestionsNetwork Security Review questions.wpdNTC Feb 28, 2007d. Backdoorse. DoS attacksf. Hijackingg. Session Replayh. Social
View Full Document