Information Sec Unit 4 & 5 Answers
Information Sec Unit 4 & 5 Answers
Information Sec Unit 4 & 5 Answers
2 Marks
1. Explain the operation and role of the IEEE 802.1X Port-Based Network
Access Control mechanism.
• Ans: - 802.1X protocol—An IEEE standard for port-based network access
control (PNAC) on wired and wireless access points. 802.1X defines
authentication controls for any user or device trying to access a LAN or
WLAN.
• NAC—A proven networking concept that identifies users and devices by
controlling access to the network. NAC controls access to enterprise
resources using authorization and policy enforcement.
There are many ways to deploy a NAC, but the essentials are:
1. You work with the latest and most updated security tools
available. For anti-virus tools to be effective and useful, they need to
work with the latest virus definitions, allowing them to stomp out threats,
even the newest ones. With security as a service, you’re always using tools
that are updated with the latest threats and options. This means no more
worrying that your users are not updating their anti-virus software and
keeping other software up to date to ensure the latest security patches are
in use. The same case goes for updating and maintaining spam filters.
2. You get the best security people working for you. IT security
experts are at your beck and call, and they may have more experience and
a better skillset than anybody on your IT team.
3. Faster provisioning. The beauty of as-a-service offerings is that you
can give your users access to these tools instantly. SECaaS offerings are
provided on demand, so you can scale up or down as the need arises, and
you can do so with speed and agility.
4. You get to focus on what's more important for your
organization. Using a web interface or having access to a management
dashboard can make it easier for your own IT team to administer and
control security processes within the organization.
5. Makes in-house management simpler. If you have protected data, it
is not enough to just keep it secure. You should know when a user
accesses this data when he or she does not have any legitimate business
reason to access it.
5. Save on costs. You do not have to buy hardware or pay for software
licenses. Instead, you can replace the upfront capital with variable
operating expense, usually at a discounted rate compared to the upfront
costs.
5. Lack of Skill –
While working, shifting o another service provider, need an extra
feature, how to use a feature, etc. are the main problems caused
in IT Company who doesn’t have skilled Employee. So it
requires a skilled person to work with cloud Computing.
EAP is used to authenticate simple dialup and LAN connections. Its major
scope is wireless network communication such as access points used to
authenticate client-wireless/LAN network systems.
8. List some commonly used cloud-based data services. Explore and compare
these services based on their use of encryption, flexibility, efficiency, speed,
and ease of use.
Ans: - What are different cloud services?
There are 4 main types of cloud computing: private clouds, public clouds, hybrid
clouds, and multiclouds. There are also 3 main types of cloud computing
services: Infrastructure-as-a-Service (IaaS), Platforms-as-a-Service (PaaS), and
Software-as-a-Service (SaaS).
1. What is the typical relationship among the untrusted network, the firewall,
and the trusted network?
6. What is a circuit gateway, and how does it differ from the other forms of
firewalls?
Ans: - A circuit gateway is a type of firewall that operates at the transport layer. It is
different from regulat firewalls in that it does not look at traffic flow between networks.
7. What special function does a cache server perform? Why is this useful for
larger organizations?
Ans: - These types of servers can store the most recently accessed Web pages in their
internal cache memory, and thus can provide content for heavily accessed pages without
the level of traffic required when pages are not cached.
8. Describe how the various types of firewalls interact with the network traffic
at various levels of the OSI model.
Ans: - Packet filtering firewalls include Static Filtering, dynamic filtering, and stateful
inspection filtering these all work at the transport layer of the network. Packet filtering
interacts with network traffic to confirm or deny it based on a rule set for a packet going up
against a set of rules that is determined. Static filtering is up against a rule set for each
packet, dynamic filtering filters packets depending on network traffic and usage limits, and
stateful inspection examines packets and verifies where they are coming and going to
determine via logs.
9. What is a hybrid firewall?
Ans: - Hybrid firewalls consist of multiple firewalls, each providing a specified set of
functions. For instance, you can use one firewall to execute packet filtering while another
firewall acts as a proxy.
10. List the five generations of firewall technology. Which generations are still in
common use?
10. Identify Virtual private networks and discuss the technology that enables
them.
Ans: - A virtual private network, or VPN, is an encrypted connection over the Internet from a
device to a network. The encrypted connection helps ensure that sensitive data is safely
transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows
the user to conduct work remotely. VPN technology is widely used in corporate
environments.
The two most used technologies for this are IPSec VPNs and SSL VPNs. IPSec VPNs use
the IPSec protocol to create the VPN tunnel. IPSec VPNs operate at the network layer of the
OSI model. When a client connects through an IPSec VPN, he or she has virtually full
access to the network.