Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Guide to Network Defense and Countermeasures, Weaver - Solutions, summaries, and outlines. 2022 updated

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
20-03-2022
Written in
2021/2022

Description: INCLUDES Some or all of the following - Supports different editions ( newer and older) - Answers to problems & Exercises. in addition to cases - Outlines and summary - Faculty Approved answers. - Covers ALL chapters.

Show more Read less
Institution
Course

Content preview

Chapter 1 Answers, Guide to Network Defense & Countermeasures, 3e


Review Questions
1. a. inside the company
2. d. all of the above
3. c. nonrepudiation
4. a. their own subnet
b. a DMZ
d. a network perimeter
5. a. port number
d. IP address
6. d. cyberterrorist
7. b. socket
8. b. rule base
9. nonrepudiation, confidentiality, integrity, availability
10. c. physical
11. b. disrupt computer-controlled industrial operations
12. False
13. a. worm
b. virus
14. d. block all traffic
15. a. signatures



Case Projects
Case Project 1-1: Determining Legal Requirements for
Penetration Testing
Answers may vary, but students should address the need to obtain written
permission for the penetration tests. State laws include Hawaii Rev. Stat. § 708-892, §
708-891.5, § 708-895.5, § 708-892.5. Federal laws include Criminal Code, Title 18,
Sections § 1029, § 1030, § 1362, § 2510, § 2701.

Case Project 1-2: Understanding the Rules of Engagement for
Security Testers
The OSSTMM's rules of engagement are available at
www.isecom.org/osstmm/rules.shtml.

Chapter 2 Answers, Guide to Network Defense & Countermeasures, 3e

, Review Questions
1. b. IPv6 uses a 128-bit address space.
d. IPv6 incorporates IPsec.
2. d. 192, 223
3. a. Network Address Translation (NAT)
c. proxy servers
4. b. testing the local TCP/IP software implementation
5. c. It is connectionless.
6. b. 191.9.205.22/18
7. d. Routers break packets into smaller pieces called fragments.
8. c. Multicast Listener Discovery
d. Neighbor Discovery
9. c. FQDNs, IP addresses
10. b. Fragments numbered 1 or higher are passed through filters.
11. a. multicast
12. b. sliding window size
13. a. SYN
14. c. 58
15. b. 1080::8:800:200C:417A



Hands-on Projects
Hands-on Project 2-3: Examining Individual ARP and Ping Packets
9. Expand the Internet Control Message Protocol section. What is the pattern in the
content of the 32 bytes of data that are sent in a Windows ping?
Answer: The partial alphabet.

Hands-on Project 2-4: Examining IPv6 Ping Packets
5. This chapter included a number of figures that show header structures, including
Figures 2-2, 2-3, 2-5, 2-8, and 2-9. In the space below, create a figure that shows
the structure of this Neighbor Solicitation message.
Answer: A solution is included in HOP 2-4 solution.vsd and HOP 2-4 solution.docx.

Hands-on Project 2-5: A Challenge
The –l indicates that the data size of the ping request and reply will be specified in
bytes. Because the maximum transmission unit size of Ethernet is 1500 bytes, a
5000-byte ping needs to be fragmented by IP. As a result, while the first packet of
each echo request or reply is an ICMPv6 packet, the remaining fragments are IP
protocol packets. In these packets the IPv6 option header, Fragmentation Header, is
added to the IPv6 header. The More Fragment field in the fragmentation header
indicates whether more packets are associated with this ping; it also includes an
offset that indicates which byte of the 5000-byte ping is the first byte in the current
fragment.

, Case Projects
Case Project 2-1: The Differences between IPv4 and IPv6
Answers may vary, but a correct answer would include references to the following:
 Available addresses expanded from 32 bits to 128 bits in IPv6.
 There is no likelihood that addresses will be exhausted in the foreseeable future.
 Native IPsec support is provided in IPv6.
 Native support for flow control Quality of Service is provided in IPv6 to improve
performance of multimedia transmissions.
 ARP broadcasts are no longer required with IPv6 because ND performs this
function.
 Multicasting is more efficient in IPv6.
 IPv6 does not require static or DHCP configuration; it can use autoconfiguration.

Chapter 3 Answers, Guide to Network Defense & Countermeasures, 3e


Review Questions
1. c. attack signatures
2. c. Installing application patches can thwart a reported attack.
3. a. logon attempts
c. TCP options
4. d. checksum
5. a. Fragments are too large or too small.
b. The initial packet is missing.
c. The fragments arrive too slowly.
6. c. one with the SYN flag set
7. d. an established connection
8. b. ICMP flood
9. a. It acknowledges receipt of the previous packet in the sequence.
10. c. SYN, SYN/ACK, ACK
11. b. FTP
12. b. ping sweep
13. d. portmapper
14. a. Watch your log files closely.
d. Keep your IDPS signature files updated.
15. c. IPv6 fragmentation occurs only at the source node.



Case Projects
Case Project 3-1: Evading Firewalls and the IDPS
You can use the following Nmap options to evade firewalls and the IDPS:
-f (fragment packets); --mtu (using the specified MTU)

Connected book

Written for

Institution
Course

Document information

Uploaded on
March 20, 2022
Number of pages
19
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$40.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TestBanks2022 Harvard University
Follow You need to be logged in order to follow users or courses
Sold
2174
Member since
4 year
Number of followers
1702
Documents
2238
Last sold
1 week ago

4.0

351 reviews

5
191
4
59
3
45
2
18
1
38

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions