Page 808 - StudyBook.pdf
P. 808

792    Appendix • Self Test Appendix

             Chapter 7: Topologies and IDS



             1.  Your company is considering implementing a VLAN.As you have studied for you Security+
                 exam, you have learned that VLANs offer certain security benefits as they can segment network
                 traffic.The organization would like to set up three separate VLANs in which there is one for
                 management, one for manufacturing, and one for engineering. How would traffic move for the
                 engineering to the management VLAN?
                  A. The traffic is passed directly as both VLAN’s are part of the same collision domain
                  B. The traffic is passed directly as both VLAN’s are part of the same broadcast domain
                  C. Traffic cannot move from the management to the engineering VLAN
                  D. Traffic must be passed to the router and then back to the appropriate VLAN.
              D.The traffic is passed to the router as the VLAN’s operate as totally separate switches.VLANs
                 can be geographically dispersed or located all in one area.
              Answers A, B, and C are incorrect, even without VLAN’s switches separate collision domains.
                 While switches normally separate collision domains, broadcast domains are common to a
                 switch. One of the reasons for using a VLAN is that it can disconnect ports on the switch so
                 that broadcast traffic is no longer passed to all ports.While VLANs separate this traffic, this
                 would be of no use if the separate systems could not communicate at all; thus a router is used
                 to allow communication.

             2.  You have been asked to protect two Web servers from attack.You have also been tasked with
                 making sure that the internal network is also secure.What type of design could be used to meet
                 these goals while also protecting all of the organization?
                  A. Implement IPSec on his Web servers to provide encryption
                  B. Create a DMZ and place the Web server in it while placing the intranet behind the
                      internal firewall
                  C. Place a honeypot on the internal network
                  D. Remove the Cat 5 cabling and replace it with fiber-optic cabling.
              B.You should create a DMZ and place the Web server in it while placing the intranet behind
                 the internal firewall.This configuration would offer the greatest level of protection.
              Incorrect Answers & Explanations:Answer A is incorrect because IPSec would only offer
                 encryption.While that would make the Web servers more secure, it would do nothing to pro-
                 tect the internal network.Answer C is incorrect because a honeypot could be used to lure
                 attackers away from critical assets, but by itself would not protect the internal network or pre-
                 vent other attacks.Answer D is incorrect because removing copper cable would make the net-
                 work harder to tap and would not protect it from many of the other attacks that could be
                 launched.

              3.  You have been asked to put your Security+ certification skills to use by examining some net-
                  work traffic.The traffic was from an internal host and you must identify the correct address.
                  Which of the following should you choose?




          www.syngress.com
   803   804   805   806   807   808   809   810   811   812   813