Exam 21: Network Endpoint Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An IDS comprises three logical components: sensors, __________ , and user interface.

(Short Answer)
4.8/5
(38)

An __________ is violations of security policy, usually characterized as attempts to affect the confidentiality, integrity, or availability of a computer or network.

(Multiple Choice)
4.8/5
(30)

Malicious software, commonly called __________ , is perhaps the most significant security threat to organizations.

(Short Answer)
4.8/5
(42)

the first step in a DDoS attack is for the attacker to infect a number of machines with zombie software that will ultimately be used to carry out the attack.

(True/False)
4.9/5
(42)

A __________ attack attempts to consume the target's resources so that it cannot provide service.

(Short Answer)
4.9/5
(45)

the __________ defines the transport protocol.

(Multiple Choice)
4.8/5
(38)

there are two general approaches to intrusion detection: Misuse detection and ___________ .

(Short Answer)
4.8/5
(43)

A circuit-level gateway permits an end-to-end tCP connection.

(True/False)
4.8/5
(43)

Packet filter gateways tend to be more secure than application- level gateways.

(True/False)
4.7/5
(30)

the firewall provides an additional layer of defense, insulating internal systems from external networks or other parts of the internal network.

(True/False)
5.0/5
(38)

A stateful packet inspection firewall reviews the same packet information as a packet filtering firewall, but also records information about tCP connections.

(True/False)
4.8/5
(34)

A __________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.

(Short Answer)
4.8/5
(33)

Between internal and external firewalls are one or more networked devices in a region referred to as a __________ network.

(Multiple Choice)
4.8/5
(44)

Packet filter firewalls are susceptible to security breaches caused by improper configurations.

(True/False)
5.0/5
(39)

One limitation of a firewall is that an improperly secured wireless LAN may be accessed from outside the organization.

(True/False)
4.9/5
(43)

__________ controls how particular services are used.

(Multiple Choice)
4.8/5
(47)

A(n) __________ is placed at the edge of a local or enterprise network, just inside the boundary router that connects to the Internet or some wide area network.

(Short Answer)
4.8/5
(38)

A __________ provides a location for monitoring security-related events.

(Multiple Choice)
4.7/5
(45)

Intrusion detection is the process of collecting information about events occurring in a computer system or network and analyzing them for signs of intrusions.

(True/False)
4.8/5
(37)

__________ control determines the types of Internet services that can be accessed, inbound or outbound.

(Short Answer)
4.8/5
(33)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)