Exam 21: Network Endpoint Security
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
A __________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.
Free
(Short Answer)
4.9/5
(39)
Correct Answer:
packet filtering
An application-level gateway, also called a(n) __________ , acts as a relay of application-level traffic.
Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
A
there are four techniques that firewalls use to control access and enforce the site's security policy: service control, direction control, user control, and __________ .
Free
(Short Answer)
4.7/5
(29)
Correct Answer:
behavior control
__________ determines the direction in which particular service requests may be initiated and allowed to flow through the firewall.
(Multiple Choice)
4.8/5
(35)
Information security ___________ consists of processes for detecting,
reporting, assessing, responding to, dealing with, and learning from
information security incidents.
(Short Answer)
4.8/5
(35)
Multiple internal firewalls can be used to protect portions of the
internal network from each other.
(True/False)
4.8/5
(34)
the user control feature is typically applied to users outside the
firewall perimeter.
(True/False)
4.8/5
(22)
A __________ is an undocumented way of gaining access to a computer system.
(Multiple Choice)
4.8/5
(30)
A firewall may filter traffic on the basis of IP address, protocol, or
port number.
(True/False)
4.9/5
(36)
__________ can more readily see the intended outcome of an attempted attack because they can directly access and monitor the data files and system processes usually targeted by attacks.
(Multiple Choice)
4.8/5
(38)
Systems that are externally accessible but need some protections are usually located on _________ networks.
(Multiple Choice)
4.8/5
(26)
the primary benefit of a host-based IDS is that it can detect both
external and internal intrusions.
(True/False)
5.0/5
(26)
A __________ attack can be defeated by enforcing a rule that the first fragment of a packet must contain a predefined minimum amount of the transport header.
(Short Answer)
4.8/5
(40)
A __________ is a computer program that can copy itself and infect a computer without permission or knowledge of the user.
(Multiple Choice)
4.9/5
(40)
the internal firewall provides a measure of access control and
protection for the DMZ systems consistent with their need for external connectivity.
(True/False)
4.8/5
(31)
A scanning strategy that uses information contained on an infected victim machine to find more hosts to scan is the __________ method.
(Multiple Choice)
4.8/5
(37)
A(n) __________ is hardware or software products that gather and analyze information from various areas within a computer or a network for the purpose of finding, and providing real-time or near-real-time warning of, attempts to access system resources in an unauthorized manner.
(Short Answer)
4.9/5
(36)
the __________ to an IDS enables a user to view output from the system or
control the behavior of the system.
(Short Answer)
5.0/5
(37)
Data collection, correlation, alerting, and reporting/compliance are all key elements of ___________ .
(Multiple Choice)
4.9/5
(38)
__________ is the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the dat
A.
(Short Answer)
4.7/5
(29)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)