A patch is a modification to software that fixes an error in an operational application system on a computer. Generally, the software vendor supplies the patch. A probe is a device programmed to gather information about a system or its users. Tags and labels are used in access controls. Encryption and smart cards are used in user identification and authentication mechanisms.
238. Which of the following
a. Providing a secure channel between the user and the system
b. Installing hardware-reset button for passwords
c. Implementing cryptographic authentication techniques
d. Installing input overflow checks
239. Which of the following can prevent both session hijacking and eavesdropping attacks?
a. SET
b. PPP
c. FTP
d. SSL
The other three choices are incorrect because SET is a secure electronic transaction protocol, PPP is a point-to-point protocol, and FTP is a file transfer protocol, and as such they cannot prevent session hijacking and eavesdropping attacks.
240. Which of the following provides a security service in authenticating a remote network access?
a. Remote access server
b. Windows NT server
c. An exchange server
d. A DNS server
241. Which one of the following firewalls is simple, inexpensive, and quick to implement?
a. Static packet filter firewall
b. Dynamic packet filter firewall
c. Application gateway firewall
d. Stateful inspection gateway firewall
242. Which of the following can prevent e-mail spoofing?
a. Pretty good privacy
b. Point-to-point protocol
c. Microcom networking protocol
d. Password authentication protocol
Point-to-point protocol (PPP) connects two TCP/IP devices over a standard serial line, such as a common telephone link. Microcom networking protocol (MNP) defines various levels of error correction and compression for modems. Password authentication protocol (PAP) is a handshaking protocol.
243. Security problems associated with network device passwords, network devices (e.g., routers and switches), and managing access points (APs) configuration in a legacy wireless local-area network (WLAN) environment require which of the following security controls to solve
a. Switch Telnet to SSH
b. Switch HTTP to HTTPS
c. Switch SNMP to SNMPv3
d. Switch FTP to SFTP