Exam 21: Network Endpoint Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A __________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.

Free
(Short Answer)
4.9/5
(39)
Correct Answer:
Verified

packet filtering

An application-level gateway, also called a(n) __________ , acts as a relay of application-level traffic.

Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
Verified

A

there are four techniques that firewalls use to control access and enforce the site's security policy: service control, direction control, user control, and __________ .

Free
(Short Answer)
4.7/5
(29)
Correct Answer:
Verified

behavior control

__________ determines the direction in which particular service requests may be initiated and allowed to flow through the firewall.

(Multiple Choice)
4.8/5
(35)

Information security ___________ consists of processes for detecting, reporting, assessing, responding to, dealing with, and learning from information security incidents.

(Short Answer)
4.8/5
(35)

Multiple internal firewalls can be used to protect portions of the internal network from each other.

(True/False)
4.8/5
(34)

the user control feature is typically applied to users outside the firewall perimeter.

(True/False)
4.8/5
(22)

A __________ is an undocumented way of gaining access to a computer system.

(Multiple Choice)
4.8/5
(30)

A firewall may filter traffic on the basis of IP address, protocol, or port number.

(True/False)
4.9/5
(36)

__________ can more readily see the intended outcome of an attempted attack because they can directly access and monitor the data files and system processes usually targeted by attacks.

(Multiple Choice)
4.8/5
(38)

Systems that are externally accessible but need some protections are usually located on _________ networks.

(Multiple Choice)
4.8/5
(26)

the primary benefit of a host-based IDS is that it can detect both external and internal intrusions.

(True/False)
5.0/5
(26)

A __________ attack can be defeated by enforcing a rule that the first fragment of a packet must contain a predefined minimum amount of the transport header.

(Short Answer)
4.8/5
(40)

A __________ is a computer program that can copy itself and infect a computer without permission or knowledge of the user.

(Multiple Choice)
4.9/5
(40)

the internal firewall provides a measure of access control and protection for the DMZ systems consistent with their need for external connectivity.

(True/False)
4.8/5
(31)

A scanning strategy that uses information contained on an infected victim machine to find more hosts to scan is the __________ method.

(Multiple Choice)
4.8/5
(37)

A(n) __________ is hardware or software products that gather and analyze information from various areas within a computer or a network for the purpose of finding, and providing real-time or near-real-time warning of, attempts to access system resources in an unauthorized manner.

(Short Answer)
4.9/5
(36)

the __________ to an IDS enables a user to view output from the system or control the behavior of the system.

(Short Answer)
5.0/5
(37)

Data collection, correlation, alerting, and reporting/compliance are all key elements of ___________ .

(Multiple Choice)
4.9/5
(38)

__________ is the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the dat A.

(Short Answer)
4.7/5
(29)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)