SNA-Exam QP
SNA-Exam QP
SNA-Exam QP
Explain the role and operation of each of the software components 1 (30 marks)
essential to a corporate networked information system (C2, PLO1)
a) The first phase of DHCP involves the client sending out a DHCPDISCOVER
message. Why is this message sent out as a broadcast message, rather than a normal
unicast message? List and briefly describe the other 3 messages that are exchanged.
[12 marks]
The message is sent out as a broadcast. If the network contains routers, those routers can
be configured to forward DHCPDISCOVER packets to DHCP servers on attached
networks. ... This message is broadcast to the entire network to let all DHCP servers
know which server was selected.
Assuming all went well with the DHCP discovery process, the correct sequence of DHCP
messages exchanged between the server and client is: DHCPDISCOVER ->
DHCPOFFER -> DHCPREQUEST -> DHCPACK. A client sends a DHCPDISCOVER
message with a source address of 0.0.0.0 and destination address of 255.255.255.255
(broadcast). A server that received the DHCPDISCOVER message will respond with a
DHCPOFFER messa. This message contains initial configuration information for the
client. After the client receives a DHCPOFFER, it responds with a DHCPREQUEST
message, indicating its intent to accept the parameters in the DHCPOFFER, and moves
into the Requesting state. Finally, after the server receives the DHCPREQUEST, it will
respond with a DHCPACK message, thus completing the initialization process.
i. DHCPDiscover Message
DHCP client sends a DHCP Discover broadcast on the network for finding a DHCP
server. If there is no respond from a DHCP server, the client assigns itself an Automatic
Private IPv4 address (APIPA).
b) Why does the Gateway in our network need several network interfaces? Why is it
necessary to assign the IP addresses for these interfaces permanently in /etc/hosts
rather than dynamically through DHCP? [8 marks]
Typically, you might require multiple interfaces if you want to configure an instance as a
network appliance that does load balancing, Intrusion Detection, and Prevention
(IDS/IPS), Web Application Firewall (WAF), or WAN optimization between networks.
Multiple network interfaces are also useful when applications running in an instance
require traffic separation, such as separation of data plane traffic from management plane
traffic.
(In essence, IP addresses are the identifier that allows information to be sent between
devices on a network: they contain location information and make devices accessible
for communication. The internet needs a way to differentiate between different
computers, routers, and websites.)
It necessary to assign the IP addresses for these interfaces permanently in /etc/hosts rather
than dynamically through DHCP because a mapping of IP addresses to URLs may be
found in the /etc/hosts file. The /etc/hosts file is used by the browser to override the DNS
server's IP-address-to-URL mapping. This is helpful for testing DNS changes and SSL
setup before going live with a website. The Internet Protocol (IP) host names and
addresses for the local host and other hosts in the Internet network are stored in the
/etc/hosts file.
The /etc (et-see) directory is where a Linux system's configuration files live
The etc/rc.d contains the scripts that control the services, run at boot time.
( Also, It contains scripts to use to control the starting, stopping and restarting of
daemons)
a) OpenVPN and stunnel both use the concept of “encapsulation” to provide secure
network communications, but one uses the concept of “port forwarding” while the
other one uses the concept of “virtual devices”. Describe these 3 key concepts and
how they work. [15 marks]
concept is also often used to hide the internal representation, or state of an object
from the outside. This is called information hiding.
Virtual device: Virtual device is a program that manages a system resource,
such as a hardware device or installed software, so that more than one
application can use the resource at the same time. Windows uses virtual devices to
allow multitasking for Windows-based applications. Virtual devices allow numerous
PCs, virtual machines (VMs), virtual servers, and other devices to communicate
across many offices and data centers. Virtual devices expand these capabilities by
utilizing software administration to link computers and servers via the Internet,
whereas physical networking uses cables and other hardware to connect computers.
the practice of hosting several websites. VirtualHost can be IP-based, which means that
each web site has its own IP address, or name-based, which means that each IP address
has several names operating on it.
Their common goal is to deliver Web services, such as server functions and Internet
connectivity. They offer domain name registration, file storage and directory services for
the files that make up a Web page, e-mail services, and even website design and
development.
CNAME Record VirtualHost directive
Uses a different hostname for particular Uses a single IP address to host several
network services, such as email or FTP, name-based web domains.
and directing it to the root domain.
Can have the same domain registered in The configuration directives included in the
many countries and directing the national <VirtualHost> section is used by the server
versions to the main ".com" domain. when it gets a request for a document on a
certain virtual host.
A CNAME record must always link to a VirtualHost must correspond to a distinct
different domain name rather than an IP server IP address, port number, or host
address. name.
CNAME records are used to map a They're used to encapsulate a set of
subdomain, such as www or mail, to the directives that only apply to one virtual
domain that hosts the content for that host.
subdomain.
c) What does ACL stand for? What is the relationship between an ACL and a firewall?
[10 marks]
An access control list (ACL) contains rules that grant or deny access to certain digital
environments. There are two types of ACLs:
An Intrusion Detection System (IDS) analyzes network traffic for suspicious behavior
and generates warnings when such activity is detected. It is a piece of software that
monitors a network or a system for malicious activities or policy violations. Additionally,
intrusion prevention systems monitor network packets entering the system in order to
detect malicious activity and immediately issue warning alerts. By identifying and
alerting you to suspect network traffic, an IDS helps you to strengthen the security of
your network devices and important network data. Your network needs strong security to
safeguard existing data and data flows between internal and external networks. With the
sophistication and frequency of cyberattacks rising, it is critical to have a comprehensive
and adaptive intrusion detection system. In addition to enhancing network security, an
intrusion detection system may aid in the organization of vital network data.
Every day, your network creates a large amount of data, and an intrusion detection
system may assist you in differentiating between vital and non-essential activities. By
assisting you in determining which data to monitor, an intrusion detection system may
save you the time and effort associated with searching through hundreds of system logs
for crucial information.
Packet filtering is a firewall method that is used to restrict network access by monitoring
outgoing and incoming packets and allowing or denying them access depending on the
source and destination Internet Protocol (IP) addresses, protocols, and ports. Filtering
packets verifies the source and destination IP addresses.
Certain packet filters are not clever and are incapable of remembering previously used
packets. Other packet filters, on the other hand, can remember previously used packet
elements, such as source and destination IP addresses. In most cases, packet filtering
provides an effective defense against assaults from computers located outside a local area
network (LAN). Due to the fact that the majority of routing devices provide built-in
filtering capabilities, packet filtering is often regarded a conventional and cost-effective
method of security. Accounting is accomplished by the tracking of session statistics and
use data. It is used to manage authorizations, billing, trend analysis, resource
consumption, and data capacity planning for company operations.
b) Alice is thinking of making all users change their password every month. Why would
she think this is a good idea? Bob is trying to convince her not to do this. What are his
arguments against this policy? [8 marks]
Prevent Perpetual Access: Not all hackers take only what they require and then flee. At
times, hackers may maintain access to your account indefinitely, either to watch your
data or to continue stealing information. Because determining if someone else is using
your account can be difficult, changing your password frequently reduces the possibility
that other individuals will have frequent access to your accounts. To be safe, consider
changing your password every few months.
Reduce the amount of guesswork: If you use the same password over an extended
period of time, you increase the likelihood of someone guessing it. Whether it's from
someone watching you constantly enter in your password or someone attempting to guess
it, the longer you keep the same password, the longer people have to try to figure out
what it is. Allow no one to monitor your account logins and avoid using short, easy-to-
guess words or phrases.
Choosing an Effective Password: When creating a new password, you want to create
something that is resistant to guesswork and hacking efforts. While you may be tempted
to select a lengthy password, remember that quality trumps quantity. Hacking tools are
capable of determining passwords by mixing random words and phrases, as well as any
personally identifiable information.
2. If you need to change your password frequently, you're likely to use an easy-to-
remember one. And what you gain in ease of recall comes at the expense of password
complexity, making it easier for a would-be attacker to pick your lock effectively.
3. If we're constantly changing our passwords, we're far more likely to forget what
we've changed them to even more so if we use separate passwords for multiple logins,
we are probably going to forget our password frequently.
Permissions are used to control who has access to and the ability to modify the files and
directories contained within their file systems. Each file or directory has three
fundamental permission types: read, write, and execute.
read - The Read permission specifies a user's ability to read a file's contents.
write - The Write permissions specify a user's ability to create, alter, or delete a file or
directory.
execute - The Execute permission controls whether a user can run a file or inspect the
contents of a directory.
We can secure the files contained in a directory and its subdirectories by configuring the
directory's file permissions to be restrictive.