A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troubleshooting process, the network administrator notices that the web gateway proxy on the local network has signed all of the certificates on the local machine. Which of the following describes the type of attack the proxy has been legitimately programmed to perform?
A. Transitive access B. Spoofing C. Man-in-the-middle D. Replay
Ann a new security specialist is attempting to access the internet using the company’s open wireless network. The wireless network is not encrypted: however, once associated, ANN cannot access the internet or other company resources. In an attempt to troubleshoot, she scans the wireless network with NMAP, discovering the only other device on the wireless network is a firewall. Which of the following BEST describes the company’s wireless network solution?
A. The company uses VPN to authenticate and encrypt wireless connections and traffic B. The company’s wireless access point is being spoofed C. The company’s wireless network is unprotected and should be configured with WPA2 D. The company is only using wireless for internet traffic so it does not need additional encryption
A system administrator is using a packet sniffer to troubleshoot remote authentication. The administrator detects a device trying to communicate to TCP port 49. Which of the following authentication methods is MOST likely being attempted?
A. RADIUS B. TACACS+ C. Kerberos D. LDAP
Correct Answer: B Section: Access Control and Identity Management
TACACS makes use of TCP port 49 by default.
A: RADIUS makes use of UDP only.
C, D: Kerberos and LDAP do not make use of TCP port 49.