Exam 6: Security Technology: Access Controls, Firewalls, and Vpns

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

A(n) ____________________ dialer is an automatic phone-dialing program that dials every number in a configured range and checks to see if a person, answering machine, or modem picks up.

(Short Answer)
5.0/5
(40)

In __________ mode, the data within an IP packet is encrypted, but the header information is not.

(Multiple Choice)
4.7/5
(49)

__________ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.

(Multiple Choice)
4.8/5
(26)

A packet-____________________ firewall installed on a TCP/IP-based network typically functions at the IP level and determines whether to drop a packet (deny) or forward it to the next network connection (allow) based on the rules programmed into the firewall.

(Short Answer)
4.9/5
(25)

A(n) __________ is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.

(Multiple Choice)
4.9/5
(37)

The dominant architecture used to secure network access today is the __________ firewall.

(Multiple Choice)
4.8/5
(40)

As organizations implement cloud-based IT solutions, bring your own device (BYOD) options for employees, and other emerging network solutions, the network perimeter may be ____________________ for them.

(Short Answer)
4.8/5
(31)

Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal servers from the public network.

(Short Answer)
4.8/5
(36)

Configuring firewall policies is viewed as much as a(n) __________ as it is a(n) __________.

(Multiple Choice)
4.7/5
(35)

The application layer proxy firewall is also known as a(n) __________.

(Multiple Choice)
4.8/5
(34)

All Internet Control Message Protocol (ICMP) data should be denied.

(Essay)
5.0/5
(40)

Even if Kerberos servers are subjected to denial-of-service attacks, a client can still request additional services.

(True/False)
4.9/5
(31)

The proxy server is often placed in an unsecured area of the network or is placed in the __________ zone.

(Multiple Choice)
4.8/5
(33)

A common DMZ arrangement is a subnet firewall that consists of two or more internal bastion hosts behind a packet-filtering router, with each host protecting the trusted network. _________________________

(True/False)
4.9/5
(36)

In most common implementation models, the content filter has two components: __________.

(Multiple Choice)
4.8/5
(34)

A __________ filtering firewall can react to an emergent event and update or create rules to deal with the event.

(Multiple Choice)
4.9/5
(31)

A ____________________ mode VPN establishes two perimeter tunnel servers to encrypt all traffic that will traverse an unsecured network. The entire client packet is encrypted and added as the data portion of a packet addressed from one tunneling server to another.

(Short Answer)
4.7/5
(38)

​Accountability is the matching of an authenticated entity to a list of information assets and corresponding access levels.

(True/False)
4.8/5
(38)

The static packet filtering firewall can react to an emergent event and update or create rules to deal with that event. _________________________

(True/False)
4.9/5
(43)

Which of the following versions of TACACS is still in use?

(Multiple Choice)
4.8/5
(43)
Showing 61 - 80 of 117
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)