Date of Issue: 09-01-2023 Rate this Study Guide



Question 1.
TCP Wrapper:
(Choose 2)

a) Intercepts TCP requests en route to inetd or other host IP driver.
b) Blocks TCP requests en route to inetd.
c) Records the attempt transparently to the user.
d) Records the attempt and sends a warning to an unauthorized user.

Answer


Question 2.
Tunnels are used for

a) Connecting intranets across a WAN link.
b) Extranets.
c) Remote worker access (either home-based or out of the office).
d) All of these are correct

Answer


Question 3.
Communications need only be secured when they go outside your own network; securing them internally is a waste of bandwidth (in overhead) and/or CPU cycles (for encryption) and should be avoided as a matter of best practice.

a) True
b) False

Answer


Answers


Question 1.
TCP Wrapper:
(Choose 2)

a) Intercepts TCP requests en route to inetd or other host IP driver.
b) Blocks TCP requests en route to inetd.
c) Records the attempt transparently to the user.
d) Records the attempt and sends a warning to an unauthorized user.

Answer

a) Intercepts TCP requests en route to inetd or other host IP driver.
c) Records the attempt transparently to the user.

Explanation
To use the UNIX structure, TCP wrapper intercepts the TCP process and records certain information about it before passing the request on to the inetd process for action (inetd is the "master process" for internetworking functions such as FTP, telnet, finger, systat, etc.). This recording is invisible to the host accessing from the outside. The accesses to each of the processes initiated by inetd are logged (they are reported to the syslog process).
[4867]


Question 2.
Tunnels are used for

a) Connecting intranets across a WAN link.
b) Extranets.
c) Remote worker access (either home-based or out of the office).
d) All of these are correct

Answer

d) All of these are correct

Explanation
Tunnels are used not only between major sites of an enterprise, but also for VPNs (Virtual Private Networks) and VPDNs (Virtual Private Dialup Networks). These can connect satellite offices to a main office, home-based workers to the central office (via cable or DSL service or dialup service), and they can be used for extranets.
[4889]


Question 3.
Communications need only be secured when they go outside your own network; securing them internally is a waste of bandwidth (in overhead) and/or CPU cycles (for encryption) and should be avoided as a matter of best practice.

a) True
b) False

Answer

b) False

Explanation
This statement would be true if all your users (or, for that matter, anyone who gained unauthorized access to your network) only went where they were supposed to go. Of course, someone who isn't supposed to be there in the first place...

The point is that humans are, by nature, curious. Add any degree of technical competence to that curiosity and you have a recipe for unauthorized access within the network by someone who should be trustworthy. Since you may expect such access to occur, if the communications need to be secure outside the network, they also need to be secure all the way from one endpoint to the other -- including inside your network.
[4866]


[IE-Crypt2-SQ1-F03]
[2002-08-28-02]


Copyright © 2002 Genium Publishing Corporation