A patch is a modification to software that fixes an error in an operational application system on a computer. Generally, the software vendor supplies the patch. A probe is a device programmed to gather information about a system or its users. Tags and labels are used in access controls. Encryption and smart cards are used in user identification and authentication mechanisms.
238. Which of the following
a.
Providing a secure channel between the user and the systemb.
Installing hardware-reset button for passwordsc.
Implementing cryptographic authentication techniquesd.
Installing input overflow checks239. Which of the following can prevent both session hijacking and eavesdropping attacks?
a.
SETb.
PPPc.
FTPd.
SSLThe other three choices are incorrect because SET is a secure electronic transaction protocol, PPP is a point-to-point protocol, and FTP is a file transfer protocol, and as such they cannot prevent session hijacking and eavesdropping attacks.
240. Which of the following provides a security service in authenticating a remote network access?
a.
Remote access serverb.
Windows NT serverc.
An exchange serverd.
A DNS server241. Which one of the following firewalls is simple, inexpensive, and quick to implement?
a.
Static packet filter firewallb.
Dynamic packet filter firewallc.
Application gateway firewalld.
Stateful inspection gateway firewall242. Which of the following can prevent e-mail spoofing?
a.
Pretty good privacyb.
Point-to-point protocolc.
Microcom networking protocold.
Password authentication protocolPoint-to-point protocol (PPP) connects two TCP/IP devices over a standard serial line, such as a common telephone link. Microcom networking protocol (MNP) defines various levels of error correction and compression for modems. Password authentication protocol (PAP) is a handshaking protocol.
243. Security problems associated with network device passwords, network devices (e.g., routers and switches), and managing access points (APs) configuration in a legacy wireless local-area network (WLAN) environment require which of the following security controls to solve
a.
Switch Telnet to SSHb.
Switch HTTP to HTTPSc.
Switch SNMP to SNMPv3d.
Switch FTP to SFTP