Exam 6: Security Technology: Access Controls, Firewalls, and VPNS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____________________ Access Controller Access Control System contains a centralized database, and it validates the user's credentials at the TACACS server.

Free
(Short Answer)
4.7/5
(34)
Correct Answer:
Verified

Terminal

Kerberos uses asymmetric key encryption to validate an individual user to various network resources. _________________________

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

False

The filtering component of a content filter is like a set of firewall rules for Web sites, and is common in residential content filters. _________________________

Free
(True/False)
4.9/5
(33)
Correct Answer:
Verified

False

The architecture of a(n) ____________________ firewall provides a DMZ.

(Short Answer)
4.9/5
(27)

__________ filtering requires that the firewall's filtering rules for allowing and denying packets are developed and installed with the firewall.

(Multiple Choice)
4.9/5
(40)

Port Address Translation assigns non-routing local addresses to computer systems in the local area network and uses ISP-assigned addresses to communicate with the Internet on a one-to-one basis. _________________________

(True/False)
4.9/5
(34)

The RADIUS system decentralizes the responsibility for authenticating each user by validating the user's credentials on the NAS server.

(True/False)
4.9/5
(41)

Internet connections via dial-up lines are regaining popularity due to recent technological developments.

(True/False)
4.9/5
(34)

Traceroute, formally known as an ICMP Echo request, is used by internal systems administrators to ensure that clients and servers can communicate. _________________________

(True/False)
4.9/5
(42)

The restrictions most commonly implemented in packet-filtering firewalls are based on __________.

(Multiple Choice)
5.0/5
(42)

Content filters are often called ____________________ firewalls.

(Short Answer)
4.9/5
(37)

One of the biggest challenges in the use of the trusted computer base (TCB) is the existence of explicit channels. _________________________

(True/False)
4.9/5
(40)

​Task-based controls are associated with the assigned role a user performs in an organization, such as a position or temporary assignment like project manager.

(True/False)
5.0/5
(30)

__________ and TACACS are systems that authenticate the credentials of users who are trying to access an organization's network via a dial-up connection.

(Multiple Choice)
4.7/5
(31)

It is important that e-mail traffic reach your e-mail server and only your e-mail server.

(True/False)
4.8/5
(39)

The ____________________ describes the number of legitimate users who are denied access because of a failure in the biometric device. This failure is known as a Type I error.

(True/False)
4.9/5
(39)

A(n) ____________________ filter is a software filter-technically not a firewall-that allows administrators to restrict access to content from within a network.

(Short Answer)
4.9/5
(39)

Some firewalls can filter packets by protocol name.

(True/False)
4.9/5
(37)

In order to keep the Web server inside the internal network, direct all HTTP requests to the internal filtering firewall and configure the internal filtering router/firewall to allow only that device to access the internal Web server. _________________________

(True/False)
4.8/5
(33)

List and describe the interacting services of the Kerberos system.

(Essay)
4.9/5
(31)
Showing 1 - 20 of 106
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)