Exam 6: Security Technology: Access Controls, Firewalls, and Vpns

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The presence of external requests for Telnet services can indicate a potential attack. _________________________

(True/False)
4.8/5
(38)

Key Distribution Center (KDC), which generates and issues session keys.

(Short Answer)
4.9/5
(38)

A routing table tracks the state and context of each packet in the conversation by recording which station sent what packet and when. _________________________

(True/False)
4.9/5
(37)

The application firewall is also known as a(n) ____________________ server.

(Short Answer)
4.8/5
(44)

In static filtering, configuration rules must be manually created, sequenced, and modified within the firewall. _________________________

(True/False)
4.8/5
(30)

Firewalls operate by examining a data packet and performing a comparison with some predetermined logical rules. _________________________

(True/False)
5.0/5
(39)

Kerberos ticket granting service (TGS), which provides tickets to clients who request services. In Kerberos a ticket is an identification card for a particular client that verifies to the server that the client is requesting services and that the client is a valid member of the Kerberos system and therefore authorized to receive services. The ticket consists of the client's name and network address, a ticket validation starting and ending time, and the session key, all encrypted in the private key of the server from which the client is requesting services.

(Short Answer)
4.9/5
(34)

When Web services are offered outside the firewall, HTTP traffic should be blocked from internal networks through the use of some form of proxy access or DMZ architecture.

(True/False)
4.8/5
(31)

In order to keep the Web server inside the internal network, direct all HTTP requests to the internal filtering firewall and configure the internal filtering router/firewall to allow only that device to access the internal Web server. _________________________

(True/False)
4.9/5
(35)

The DMZ can be a dedicated port on the firewall device linking a single bastion host.

(True/False)
4.8/5
(40)

One of the biggest challenges in the use of the trusted computer base (TCB) is the existence of explicit channels. _________________________

(True/False)
4.8/5
(39)

A VPN, used properly, allows use of the Internet as if it were a private network.

(True/False)
4.8/5
(40)

The primary disadvantage of stateful packet inspection firewalls is the additional processing required to manage and verify packets against the state table. _________________________

(True/False)
4.9/5
(30)

Authentication is a mechanism whereby unverified entities who seek access to a resource provide a label by which they are known to the system. _________________________

(True/False)
4.8/5
(39)

Authentication is the process of validating and verifying an unauthenticated entity's purported identity.

(True/False)
4.8/5
(48)

The architecture of a(n) ____________________ firewall provides a DMZ.

(Short Answer)
4.7/5
(38)

The RADIUS system decentralizes the responsibility for authenticating each user by validating the user's credentials on the NAS server.

(True/False)
4.8/5
(28)

Which of the following is not a major processing mode category for firewalls?

(Multiple Choice)
4.9/5
(39)

​Lattice-based access control is a form of access control in which users are assigned a matrix of authorizations for particular areas of access.

(True/False)
4.9/5
(29)

Most current operating systems require specialized software to connect to VPN servers, as support for VPN services is no longer built into the clients.

(True/False)
4.8/5
(40)
Showing 21 - 40 of 117
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)