Exam 6: Security Technology: Access Controls, Firewalls, and Vpns

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The popular use for tunnel mode VPNs is the end-to-end transport of encrypted data. _________________________

(True/False)
4.9/5
(40)

Good firewall rules include denying all data that is not verifiably authentic.

(True/False)
4.9/5
(36)

A(n) ____________________ private network is a secure network connection between systems that uses the data communication capability of an unsecured and public network.

(Short Answer)
4.9/5
(34)

The false reject rate describes the number of legitimate users who are denied access because of a failure in the biometric device. _________________________

(True/False)
4.8/5
(43)

A content filter, also known as a reverse firewall, is a network device that allows administrators to restrict access to external content from within a network.

(True/False)
5.0/5
(28)

Though not used as much in Windows environments, terminal emulation is still useful to systems administrators on Unix/Linux systems.

(True/False)
4.8/5
(35)

What must a VPN accomplish to offer a secure and reliable capability while relying on public networks?

(Essay)
4.9/5
(37)

Briefly describe the best practice rules for firewall use.

(Not Answered)
This question doesn't have any answer yet
Ask our community

All data that is not verifiably authentic should be denied.

(Essay)
4.7/5
(26)

Packet-filtering firewalls scan network data packets looking for compliance with the rules of the firewall's database or violations of those rules.

(True/False)
4.8/5
(30)

Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the ____________________ host.

(Short Answer)
4.8/5
(32)

A firewall cannot be deployed as a separate network containing a number of supporting devices.

(True/False)
4.9/5
(33)

Secure VPNs use security protocols and encrypt traffic transmitted across unsecured public networks like the Internet. _________________________

(True/False)
4.8/5
(40)

In SESAME, the user is first authenticated to an authentication server and receives a token. The token is then presented to a privilege attribute server as proof of identity to gain a(n) __________.

(Multiple Choice)
4.7/5
(36)

An attacker who suspects that an organization has dial-up lines can use a device called a(n) war dialer to locate the connection points. _________________________

(True/False)
4.9/5
(33)

List and describe the interacting services of the Kerberos system.

(Essay)
4.8/5
(27)

The ____________________ describes the number of legitimate users who are denied access because of a failure in the biometric device. This failure is known as a Type I error.

(True/False)
4.9/5
(35)

The primary benefit of a VPN that uses _________ is that an intercepted packet reveals nothing about the true destination system.

(Multiple Choice)
4.7/5
(37)

The service within Kerberos that generates and issues session keys is known as __________.

(Multiple Choice)
4.7/5
(35)

____________________ is a firewall type that keeps track of each network connection between internal and external systems using a table and that expedites the processing of those communications.

(Essay)
4.8/5
(35)
Showing 81 - 100 of 117
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)