Site Loader
Rock Street, San Francisco

Question 1: Cisco ACLs

To complete this exercise:

1. Create a Cisco IOS standard IP access list that allows IP packets from all hosts from the 129.78 network

A. access-list 78 permit 129.78.0.0  0.0.255.255

2. Create a Cisco IOS standard IP access list that allows IP packets from all hosts from the 129.78 network except hosts on the subnet 129.78.15

A.

 access-list  78  deny    129.78.15.0  0.0.0.255

 access-list  78  permit  129.78.0.0   0.0.255.255

3. Create a Cisco IOS extended IP access list that allows any host to access a web server on TCP port 80 that IP address is 130.1.15.100

A. access-list  80  permit  tcp  0.0.0.0  130.1.15.100 eq  80

4. Create a Cisco IOS extended IP access list that allows any host to access the internal SMTP server at 130.1.15.105 (tcp port 25), and the DNS servers at 130.1.15.174 (TCP and UDP port 53)

A.

  Access-list  25    permit  tcp  0.0.0.0  130.1.15.105  0.0.0.0    130.1.15.174  eq 25

  Access-list  53    permit  udp  0.0.0.0  130.1.15.105  0.0.0.0

130.1.15.174    eq  53

Question 2:  Response  to  Attacks

     Given  this  scenario,  provide  short  answers  for  each  to  the  following  questions:

a.   What  sort  of  attack  could  this  be?

 A.  Sort  of  attack  from   external  host  63.10.100.4

b.  How  would  you  respond  as  Network  Security  Manager?

Network  Security  Manager  respond  uses  an  e-sales  web  server.

 Question 3:  Backup  Strategy

     Given this scenario, provide short answers for each to the following questions:

a.  In  what  order  should  they  be  restored?

A. tapes  are  stored  offsite

b.  Explain  the  purpose  of  each  step  in  your  system  restore  process.

A. tapes  are  re-used  on  a  monthly  basis

Question 4:   Key  Encryption

Applying  the  knowledge  of  symmetric  key  encryption  that  you  have  learnt  from  this  course  to  answer  the  following  question.

Decrypt the following ciphertext: FOJFSVVJWOOCJCYWYAAYFJWYAXSXQ (2 marks), which is created by a Caesar cipher (a simple substitution cipher). Assume the alphabet consists of 26 letters and the space (represented by the underscore character), i.e. the set: A-Z_. You need to show your working for the decryption. If you do not show your working, you will not receive full marks for this question. What was the encryption key used?

    A. 29

1.  To let other people to send encrypted messages to you, you need to generate your own key pair and publish your public key. Install GUN Privacy Guard on your own computer and perform the following tasks.

a.  Generate your own key pair. You need to use screen-shots to show that you have  successfully completed this task. A valid screen-shot is like the following. Pay attention to the red circles, which demonstrate the success of key pair generation.

   A.  key  is  Posible.

.

   b. Export your public key as plaintext into a file. You need to use two screen-shots    to  show that you have successfully completed this task. One screen-shot is to show the use of gpg command and the other is to show the exported public key. For example, the following screen-shot shows my public key, which is exported into the file: CC-pubkey.txt

   A.  gpg.

       Export  CC-pubkey.txt

2.  My public key has been published as plaintext in the file CC-pubkey.txt. I used my private key to have digitally signed a file myNotes.doc, and my signature is in the file myNotes.doc.sig. In this question, you are required to download these 3 files from the Assessment Item-2 page of the course web site and perform the following tasks:

a.  Import the CC’s public key into your gpg. You need to use a screen-shot to show that you have successfully completed this task.

 A.   Import  CC-pubkey.txt

b.  After the CC’s public key is imported into you gpg, you need to set the trust level for the CC’s key to level-5.  This is because the key has come from an untrusted source -a web site. You need to use screen-shots to show that you have successfully completed this task.

   A.  Import   CC-pubkey.txt    gpg

c.  To check the integrity of the file: myNotes.doc, you are required to verify CC’s signature against it.  Please note that myNotes.doc should be treated as a binary file and placed in the same folder as that of myNotes.doc.sig for the verification. You need to use a screen-shot to show that you have successfully completed this task.

A. gpg  myNotes.doc.

References:

http://www.exabyte.com/support/online/documentation/whitepapers/basicbackup.pdf

http://www.cqu.edu.au/referencing

Post Author: admin