Exam 11: Securing Your Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system.

(Multiple Choice)
4.9/5
(32)

A(n)____________________ is a computer that is located between a computer on an internal network and a computer on an external network with which the internal computer is communicating.

(Short Answer)
4.9/5
(45)

Stateless filtering screens on the basis of the context of the communication.

(True/False)
4.9/5
(33)

A rogue Web site is one that performs unlawful activity or that puts the user who accesses it at risk.

(True/False)
4.9/5
(36)

How does a source routing attack work?

(Essay)
4.9/5
(34)

_________________________ is designed to "provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality" (as defined in the network standard document, RFC 2406).

(Short Answer)
4.9/5
(28)

A(n)____ is information that a Web server stores on a client computer, such as the client's preferences when accessing a particular Web site, or where the client has been on the Web site.

(Multiple Choice)
4.8/5
(39)

What are the advantages of using Network Address Translation (NAT)?

(Essay)
4.9/5
(42)

A border ____ is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.

(Multiple Choice)
4.8/5
(30)

Identify four tasks that can be fulfilled by a proxy server.

(Essay)
4.8/5
(32)

Which of the following organizations sponsors the Certified Information Systems Security Professional (CISSP)certification program?

(Multiple Choice)
4.8/5
(34)

Attacks on wireless networks are sometimes called ____ -drives because the attacker may drive around an area in a car, using a portable computer to attempt to pick up a wireless signal.

(Multiple Choice)
4.8/5
(44)

A(n)_________________________ is a portion of a network that exists between two or more networks that have different security measures in place.

(Short Answer)
4.9/5
(33)

____ storage is employed by a computer system to house frequently used data for quick access.

(Multiple Choice)
4.7/5
(35)

____ engineering, in relation to computer system attacks, refers to the use of human interaction to gain access to a system or to do damage.

(Multiple Choice)
4.7/5
(39)

The NAT setup offers addresses in the ____ range as the default option.

(Multiple Choice)
4.8/5
(35)

Identify four network hardening techniques.

(Essay)
4.8/5
(23)

Provide a general description for how routers are used in border security.

(Essay)
4.9/5
(33)

A set of filtering rules, called a ____, is applied to packets through the use of IPTables.

(Multiple Choice)
4.7/5
(32)

Network devices such as switches use ____, so that when there is heavy network traffic, they have a means to store data until it can be forwarded to the right destination.

(Multiple Choice)
4.9/5
(26)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)