Exam 6: Security Technology: Access Controls, Firewalls, and Vpns
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
The presence of external requests for Telnet services can indicate a potential attack. _________________________
(True/False)
4.8/5
(38)
Key Distribution Center (KDC), which generates and issues session keys.
(Short Answer)
4.9/5
(38)
A routing table tracks the state and context of each packet in the conversation by recording which station sent what packet and when. _________________________
(True/False)
4.9/5
(37)
The application firewall is also known as a(n) ____________________ server.
(Short Answer)
4.8/5
(44)
In static filtering, configuration rules must be manually created, sequenced, and modified within the firewall. _________________________
(True/False)
4.8/5
(30)
Firewalls operate by examining a data packet and performing a comparison with some predetermined logical rules. _________________________
(True/False)
5.0/5
(39)
Kerberos ticket granting service (TGS), which provides tickets to clients who request services. In Kerberos a ticket is an identification card for a particular client that verifies to the server that the client is requesting services and that the client is a valid member of the Kerberos system and therefore authorized to receive services. The ticket consists of the client's name and network address, a ticket validation starting and ending time, and the session key, all encrypted in the private key of the server from which the client is requesting services.
(Short Answer)
4.9/5
(34)
When Web services are offered outside the firewall, HTTP traffic should be blocked from internal networks through the use of some form of proxy access or DMZ architecture.
(True/False)
4.8/5
(31)
In order to keep the Web server inside the internal network, direct all HTTP requests to the internal filtering firewall and configure the internal filtering router/firewall to allow only that device to access the internal Web server. _________________________
(True/False)
4.9/5
(35)
The DMZ can be a dedicated port on the firewall device linking a single bastion host.
(True/False)
4.8/5
(40)
One of the biggest challenges in the use of the trusted computer base (TCB) is the existence of explicit channels. _________________________
(True/False)
4.8/5
(39)
A VPN, used properly, allows use of the Internet as if it were a private network.
(True/False)
4.8/5
(40)
The primary disadvantage of stateful packet inspection firewalls is the additional processing required to manage and verify packets against the state table. _________________________
(True/False)
4.9/5
(30)
Authentication is a mechanism whereby unverified entities who seek access to a resource provide a label by which they are known to the system. _________________________
(True/False)
4.8/5
(39)
Authentication is the process of validating and verifying an unauthenticated entity's purported identity.
(True/False)
4.8/5
(48)
The architecture of a(n) ____________________ firewall provides a DMZ.
(Short Answer)
4.7/5
(38)
The RADIUS system decentralizes the responsibility for authenticating each user by validating the user's credentials on the NAS server.
(True/False)
4.8/5
(28)
Which of the following is not a major processing mode category for firewalls?
(Multiple Choice)
4.9/5
(39)
Lattice-based access control is a form of access control in which users are assigned a matrix of authorizations for particular areas of access.
(True/False)
4.9/5
(29)
Most current operating systems require specialized software to connect to VPN servers, as support for VPN services is no longer built into the clients.
(True/False)
4.8/5
(40)
Showing 21 - 40 of 117
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)