Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please solve both Questions carefully.. Thanks 37- A security administrator has

ID: 3906856 • Letter: P

Question

Please solve both Questions carefully.. Thanks

37- A security administrator has implemented an IPSes VPN. Which of the following at IPTABLES statements MUST be added to the firewall to allow the IPSec traffic through? (Select to two answers) A) iptables-A INPUT-p TCP-dport 50-j ACCEPT B) iptables -A INPUT -p UDP - - dport 51 -j ACCEPT C) iptables -A INPUT -p ESP -j ACCEPT D) iptables -A INPUT -p IP -dport AH -j ACCEPT E) iptables-A INPUT-p TCP-_ dport 51-j ACCEPT F) iptables-A INPUT-p AH-j ACCEPT 38- A company has recently been subject to a ransomware attack. The security technician needs to verify the downloads that were done most recently as part of investigative analysis. Which of the following is cryptography methods could be used to verify the downloads? A) RSA B) MD5 C) AES D) 3DES

Explanation / Answer

37. In IPSec, there are two types of protocol that is used:

AH provides authentication and integrity. So it can only verify the data while ESP can helpful in encrypting the actual data.

So, we have to ensure the following:

The rules for this are:

iptables -A INPUT -p ESP -j ACCEPT

iptables -A INPUT -p AH -j ACCEPT

So, the two options to be selected are (c) and (f).

-----------------

38)

Hashing technique allows us to create signature of a file and determine whether two files are alike by matching the MD5 hash of the two files.

Therefore, we can use MD5 to verify the downloads.

b) MD5 is the solution.

If you have any query, ask in comments.