MTCSE Q1
MTCSE Q1
Certificate authority
Registration authority
2) Select which protocol(s) and port(s) have to be opened in a firewall for an IPsec ESP tunnel to be
established:
IP protocol 51
SSH
WWW-SSL
TELNET
WWW
WINBOX
FTP
4) “Transforming data into something an attacker cannot 'understand' ” what type of network security
mechanism is it?
Authentication
Interception
Authorization
Auditing
Encryption
Modification
Standard DES encryption algorithm is cryptographically weak and should not be deployed
anymore
IPsec ESP can operate in tunnel mode and transport mode
7) In case of a rogue DHCP server is detected, what does the DHCP Alert on RouterOS do?
8) What are three main security services that IPsec VPN provide?
Data integrity
Data confidentiality
Peer authentication
Data authentication
Data validation
RC4
DES
RSA
DSA
IPsec tunneling
Digital signature
DHCP server
TLS server
11) Which of the following are the most common DHCP attacks?
DHCP Scanning
DHCP Phishing
DHCP Starvation
Rogue DHCP
MAC adresses
UDP ports
TCP ports
IP adress pool
It is a trial-and-error attack method used to obtain information such as username and password
/interfaces monitor
/system profile
/ip arp
/ip firewall filter print
DNS
ICMP
HTTP
MySQL
HTTPS
17) Select which of the following protocols and ports are commonly used for IPsec and its related
services:
IP protocol 51
TCP port 51
UDP port 50
18) “Verifying the claimed identity of a subject, such as user name, password, etc” what type of
network security mechanism is it?
Interception
Authentication
Modification
Authorization
Encryption
Auditing
19) Select which of the following IPsec modes can be used to secure LAN to LAN communication
(without using additional tunneling protocols):
AH transport mode
AH tunnel mode
Encryption
Data fabrication
Authentication
Authorization
22) To which OSI layer does the DHCP starvation attack applies?
Layer7
Layer4
Layer2
Layer1
Layer3
24) “Checking whether the subject has the right to perform the action requested” what type of
network security mechanism is it?
Authentication
Interception
Authorization
Encryption
Modification
Auditing
/system identity
/system resource
/system profile
/tool profile