All
the questions are related to Advacned network security. please
answer them asap.
the questions are related to Advacned network security. please
answer them asap.


QUESTION 1 What is the name for a predefined framework that can be used for controlling access, and is embedded into software and hardware? o 1 accounting and access model O2 user control model 3. access control model 04 authorization control model QUESTION 2 What type of additional attack does ARP spoofing rely on? 1. ONS Poisoning 2 replay 3. MITE 4. MAC spoofing QUESTION 3 What type of attack is being performed when multiple computers overwhelm a system with fake requests? 01 DD9 O 2. Dos O SYN flood 04.replay attacks QUESTION 4 Which of the following controls can be implemented so an organization can configure multiple computers by setting a single policy for enforcement? 01.group-based access control O2.computer based access control 3.role-based access control 4. system access control
QUESTIONS Areparecord of seat of a connection between an internal computer and an extra device in technology below! orang 2 Sess ramen 01 Space 4 HH HÀ | | | QUESTIONS What are concept states a seriould only been theme of persons required to perform necessary 1 let Bunctionality O2 wing oing 4 functioning QUESTION If a network admin needs to configure a winch to copy that occurs on some or all port de monitoring port on which technology will need to be supported 1. cap 2.port Identity 3 portrooping 4 port moins QUESTION Which approach uses a variety of techniques to spot the characters open to matches! 1. monitoring O2 pattern detection handmontoring O combination detection
Answer
Amswer 1) : (c) Access control model.
Answer 2) : (d) MAC spoofing.
Answer 3) : (a) DDoS.
Answer 4) : (a) group-based access control.
Answer 5) : (d) Stateful Packet filtering.
Answer 6) : (a) least functionality.
Answer 7) : (d) Port mirroring.
Answer 8) : (a) heuristic monitoring.