Exam 6: Security Technology: Access Controls, Firewalls, and Vpns
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
The popular use for tunnel mode VPNs is the end-to-end transport of encrypted data. _________________________
(True/False)
4.9/5
(40)
Good firewall rules include denying all data that is not verifiably authentic.
(True/False)
4.9/5
(36)
A(n) ____________________ private network is a secure network connection between systems that uses the data communication capability of an unsecured and public network.
(Short Answer)
4.9/5
(34)
The false reject rate describes the number of legitimate users who are denied access because of a failure in the biometric device. _________________________
(True/False)
4.8/5
(43)
A content filter, also known as a reverse firewall, is a network device that allows administrators to restrict access to external content from within a network.
(True/False)
5.0/5
(28)
Though not used as much in Windows environments, terminal emulation is still useful to systems administrators on Unix/Linux systems.
(True/False)
4.8/5
(35)
What must a VPN accomplish to offer a secure and reliable capability while relying on public networks?
(Essay)
4.9/5
(37)
Briefly describe the best practice rules for firewall use.
(Not Answered)
This question doesn't have any answer yet
Packet-filtering firewalls scan network data packets looking for compliance with the rules of the firewall's database or violations of those rules.
(True/False)
4.8/5
(30)
Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the ____________________ host.
(Short Answer)
4.8/5
(32)
A firewall cannot be deployed as a separate network containing a number of supporting devices.
(True/False)
4.9/5
(33)
Secure VPNs use security protocols and encrypt traffic transmitted across unsecured public networks like the Internet. _________________________
(True/False)
4.8/5
(40)
In SESAME, the user is first authenticated to an authentication server and receives a token. The token is then presented to a privilege attribute server as proof of identity to gain a(n) __________.
(Multiple Choice)
4.7/5
(36)
An attacker who suspects that an organization has dial-up lines can use a device called a(n) war dialer to locate the connection points. _________________________
(True/False)
4.9/5
(33)
The ____________________ describes the number of legitimate users who are denied access because of a failure in the biometric device. This failure is known as a Type I error.
(True/False)
4.9/5
(35)
The primary benefit of a VPN that uses _________ is that an intercepted packet reveals nothing about the true destination system.
(Multiple Choice)
4.7/5
(37)
The service within Kerberos that generates and issues session keys is known as __________.
(Multiple Choice)
4.7/5
(35)
____________________ is a firewall type that keeps track of each network connection between internal and external systems using a table and that expedites the processing of those communications.
(Essay)
4.8/5
(35)
Showing 81 - 100 of 117
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)