Please solve both Questions carefully.. Thanks 37- A security administrator has
ID: 3906856 • Letter: P
Question
Please solve both Questions carefully.. Thanks
37- A security administrator has implemented an IPSes VPN. Which of the following at IPTABLES statements MUST be added to the firewall to allow the IPSec traffic through? (Select to two answers) A) iptables-A INPUT-p TCP-dport 50-j ACCEPT B) iptables -A INPUT -p UDP - - dport 51 -j ACCEPT C) iptables -A INPUT -p ESP -j ACCEPT D) iptables -A INPUT -p IP -dport AH -j ACCEPT E) iptables-A INPUT-p TCP-_ dport 51-j ACCEPT F) iptables-A INPUT-p AH-j ACCEPT 38- A company has recently been subject to a ransomware attack. The security technician needs to verify the downloads that were done most recently as part of investigative analysis. Which of the following is cryptography methods could be used to verify the downloads? A) RSA B) MD5 C) AES D) 3DESExplanation / Answer
37. In IPSec, there are two types of protocol that is used:
AH provides authentication and integrity. So it can only verify the data while ESP can helpful in encrypting the actual data.
So, we have to ensure the following:
The rules for this are:
iptables -A INPUT -p ESP -j ACCEPT
iptables -A INPUT -p AH -j ACCEPT
So, the two options to be selected are (c) and (f).
-----------------
38)
Hashing technique allows us to create signature of a file and determine whether two files are alike by matching the MD5 hash of the two files.
Therefore, we can use MD5 to verify the downloads.
b) MD5 is the solution.
If you have any query, ask in comments.