Exam 6: Firewalls and Border Security
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
Connection-oriented services occur between the ____________________ sublayer of the data-link layer (layer 2) and the network layer (layer 3) in the OSI model.
(Short Answer)
4.8/5
(36)
Do routers maintain information about network station addresses and network status in databases?
(True/False)
4.7/5
(43)
UDP does not provide the same level of reliability and error checking as TCP, because it relies only on the ____________________ to ensure reliability.
(Short Answer)
4.8/5
(38)
Red Hat Linux 9.x offers the ____________________ interface for configuring NAT and complex firewall security from the command line in a terminal window.
(Short Answer)
4.8/5
(43)
The payload data within the IP packet is actually the TCP header and the application data when connection-oriented services are used.
(True/False)
5.0/5
(38)
A router performs packet filtering and is often used as a firewall on a network, in addition to the other functions it performs.
(True/False)
4.8/5
(36)
When a TCP segment is formatted with the additional IP header information, the entire unit is called a(n) ____________________ or packet.
(Short Answer)
4.8/5
(37)
When using the Red Hat Linux 9.x Security Level Configuration tool, which security level only allows connections for using DNS and DHCP services?
(Multiple Choice)
4.8/5
(34)
Does NetBEUI use the type of addressing that would enable it to be forwarded or routed to networks other than the one on which it is used?
(True/False)
4.8/5
(28)
What are the three component protocols within the TCP/IP protocol suite?
(Essay)
4.9/5
(36)
Some proxies are able to provide caching services as a way to reduce the load on servers within the internal network.
(True/False)
4.8/5
(42)
Class D addresses do not reflect the network size, but only tell you that the communication is a multicast.
(True/False)
4.9/5
(40)
TCP (and UDP) ____________________ software may be used to simply collect information about a target, without the target's knowledge; it may be used to gain access to a system, or it may be used to crash a system.
(Short Answer)
4.9/5
(37)
If you had configured a firewall in Windows XP and were concerned that you had been the victim of an attack, where would you look to be able to find out this information?
(Multiple Choice)
4.9/5
(35)
Showing 41 - 60 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)