Exam 6: Security Technology: Access Controls, Firewalls, and Vpns
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
Content filters are often called ____________________ firewalls.
(Short Answer)
4.9/5
(44)
Syntax errors in firewall policies are usually difficult to identify.
(True/False)
4.8/5
(39)
__________ filtering requires that the firewall's filtering rules for allowing and denying packets are developed and installed with the firewall.
(Multiple Choice)
4.8/5
(38)
Telnet protocol packets usually go to TCP port __________, whereas SMTP packets go to port __________.
(Multiple Choice)
4.9/5
(44)
When Web services are offered outside the firewall, HTTP traffic should be denied from reaching your internal networks through the use of some form of proxy access or DMZ architecture.
(Essay)
4.8/5
(40)
Simple Mail Transport Protocol (SMTP) data is allowed to pass through the firewall, but it should all be routed to a well-configured SMTP gateway to filter and route messaging traffic securely.
(Short Answer)
5.0/5
(31)
The firewall device must never be accessible directly from the ____________________ network.
(Short Answer)
4.8/5
(33)
A(n) ____________________ is a combination of hardware and software that filters or prevents specific information from moving between the outside world and the inside world.
(Short Answer)
4.9/5
(34)
The firewall device is never directly accessible from the public network for configuration or management purposes.
(Essay)
4.8/5
(35)
Internet connections via dial-up lines are regaining popularity due to recent technological developments.
(True/False)
4.8/5
(40)
Access control is achieved by means of a combination of policies, programs, and technologies. _________________________
(True/False)
4.9/5
(35)
A content filter is essentially a set of scripts or programs that restricts user access to certain networking protocols and Internet locations.
(True/False)
4.9/5
(27)
When a bastion host approach is used, the host contains two NICs, forcing all traffic to go through the device. _________________________
(True/False)
4.8/5
(38)
A(n) ____________________ filter is a software filter-technically not a firewall-that allows administrators to restrict access to content from within a network.
(Short Answer)
4.8/5
(30)
SESAME, as described in RFC 4120, keeps a database containing the private keys of clients and servers-in the case of a client, this key is simply the client's encrypted password. _________________________
(True/False)
4.9/5
(42)
Firewalls can be categorized by processing mode, development era, or structure.
(True/False)
4.8/5
(35)
Showing 101 - 117 of 117
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)