Exam 6: Security Technology: Access Controls, Firewalls, and Vpns
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
A(n) ____________________ dialer is an automatic phone-dialing program that dials every number in a configured range and checks to see if a person, answering machine, or modem picks up.
(Short Answer)
5.0/5
(40)
In __________ mode, the data within an IP packet is encrypted, but the header information is not.
(Multiple Choice)
4.7/5
(49)
__________ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.
(Multiple Choice)
4.8/5
(26)
A packet-____________________ firewall installed on a TCP/IP-based network typically functions at the IP level and determines whether to drop a packet (deny) or forward it to the next network connection (allow) based on the rules programmed into the firewall.
(Short Answer)
4.9/5
(25)
A(n) __________ is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.
(Multiple Choice)
4.9/5
(37)
The dominant architecture used to secure network access today is the __________ firewall.
(Multiple Choice)
4.8/5
(40)
As organizations implement cloud-based IT solutions, bring your own device (BYOD) options for employees, and other emerging network solutions, the network perimeter may be ____________________ for them.
(Short Answer)
4.8/5
(31)
Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal servers from the public network.
(Short Answer)
4.8/5
(36)
Configuring firewall policies is viewed as much as a(n) __________ as it is a(n) __________.
(Multiple Choice)
4.7/5
(35)
The application layer proxy firewall is also known as a(n) __________.
(Multiple Choice)
4.8/5
(34)
Even if Kerberos servers are subjected to denial-of-service attacks, a client can still request additional services.
(True/False)
4.9/5
(31)
The proxy server is often placed in an unsecured area of the network or is placed in the __________ zone.
(Multiple Choice)
4.8/5
(33)
A common DMZ arrangement is a subnet firewall that consists of two or more internal bastion hosts behind a packet-filtering router, with each host protecting the trusted network. _________________________
(True/False)
4.9/5
(36)
In most common implementation models, the content filter has two components: __________.
(Multiple Choice)
4.8/5
(34)
A __________ filtering firewall can react to an emergent event and update or create rules to deal with the event.
(Multiple Choice)
4.9/5
(31)
A ____________________ mode VPN establishes two perimeter tunnel servers to encrypt all traffic that will traverse an unsecured network. The entire client packet is encrypted and added as the data portion of a packet addressed from one tunneling server to another.
(Short Answer)
4.7/5
(38)
Accountability is the matching of an authenticated entity to a list of information assets and corresponding access levels.
(True/False)
4.8/5
(38)
The static packet filtering firewall can react to an emergent event and update or create rules to deal with that event. _________________________
(True/False)
4.9/5
(43)
Showing 61 - 80 of 117
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)