• About Us
  • All Categories
  • Contact
  • Home
  • Our Authors
  • Test Page
  • Global Knowledge Blog Global Knowledge Blog

--

  • Home
  • All Categories
  • Our Authors
  • About Us
  • Global Knowledge Blog
  • Home
  • All Categories
  • Our Authors
  • About Us

Security+ Question of the Week: Intranet Defense

By James Michael Stewart
July 8, 2015

securityQOW02External hackers often seek to discover the size and configuration of your intranet. Which of the following is a defense against this type of reconnaissance?

A. Install a host IDS on each server.
B. Keep malware scanners updated.
C. Use MAC filtering on border firewalls.
D. Block inbound TCP 53.

Reveal Answer

The correct answer is D.

Port 53 is related to DNS. TCP 53 is used for zone transfers while UDP 53 is used for queries. By blocking inbound TCP 53, an outsider’s attempt to grab the entire internal zone file in a single transfer request will be blocked. An internal zone file typically contains the identity of all internal system as LDAP is used my directory services, LDAP depends on DNS, and most networks use DHCP to some extent. These three services intercommunicate, so the internal DNS zone file will likely contain information about every internal system assigned an IP address.

A host IDS server will not prevent DNS zone transfers nor prevent other forms of system identification, such as ping sweeping and port scanning. Malware scanners are not the appropriate security tool. MAC filtering does not work on firewalls, that is a switch or wireless security concept.

Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)

In this article
  • Certification
  • CompTIA
  • Security+
  • CompTIA Security+
  • security+ exam prep
  • SY0-401

Join the Conversation Cancel Reply

Will not be published.


RELATED ARTICLES

  • Security+ Question of the Week: Humidity Problems

    Failing to manage humidity can result in condensation or what other problem?
    By Guest Authors December 11, 2013
  • Security+ Question of the Week: Same Network Name

    A hacker sets up a wireless access point in a vacant room next door to your office space. The wireless network supported by this unauthorized devices has the same network...
    By Guest Authors November 12, 2014
  • Security+ Question of the Week: Indicator of Integrity

    Which ephemeral key is based on an indicator of integrity?
    By James Michael Stewart August 5, 2015

CONNECT WITH US

CATEGORIES

Back to top

© 2018 Global Knowledge Training LLC. All Rights Reserved.  Site Admin | Logout