Exam 6: Security Technology: Access Controls, Firewalls, and VPNS
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
The ____________________ Access Controller Access Control System contains a centralized database, and it validates the user's credentials at the TACACS server.
Free
(Short Answer)
4.7/5
(34)
Correct Answer:
Terminal
Kerberos uses asymmetric key encryption to validate an individual user to various network resources. _________________________
Free
(True/False)
4.8/5
(36)
Correct Answer:
False
The filtering component of a content filter is like a set of firewall rules for Web sites, and is common in residential content filters. _________________________
Free
(True/False)
4.9/5
(33)
Correct Answer:
False
The architecture of a(n) ____________________ firewall provides a DMZ.
(Short Answer)
4.9/5
(27)
__________ filtering requires that the firewall's filtering rules for allowing and denying packets are developed and installed with the firewall.
(Multiple Choice)
4.9/5
(40)
Port Address Translation assigns non-routing local addresses to computer systems in the local area network and uses ISP-assigned addresses to communicate with the Internet on a one-to-one basis. _________________________
(True/False)
4.9/5
(34)
The RADIUS system decentralizes the responsibility for authenticating each user by validating the user's credentials on the NAS server.
(True/False)
4.9/5
(41)
Internet connections via dial-up lines are regaining popularity due to recent technological developments.
(True/False)
4.9/5
(34)
Traceroute, formally known as an ICMP Echo request, is used by internal systems administrators to ensure that clients and servers can communicate. _________________________
(True/False)
4.9/5
(42)
The restrictions most commonly implemented in packet-filtering firewalls are based on __________.
(Multiple Choice)
5.0/5
(42)
Content filters are often called ____________________ firewalls.
(Short Answer)
4.9/5
(37)
One of the biggest challenges in the use of the trusted computer base (TCB) is the existence of explicit channels. _________________________
(True/False)
4.9/5
(40)
Task-based controls are associated with the assigned role a user performs in an organization, such as a position or temporary assignment like project manager.
(True/False)
5.0/5
(30)
__________ and TACACS are systems that authenticate the credentials of users who are trying to access an organization's network via a dial-up connection.
(Multiple Choice)
4.7/5
(31)
It is important that e-mail traffic reach your e-mail server and only your e-mail server.
(True/False)
4.8/5
(39)
The ____________________ describes the number of legitimate users who are denied access because of a failure in the biometric device. This failure is known as a Type I error.
(True/False)
4.9/5
(39)
A(n) ____________________ filter is a software filter-technically not a firewall-that allows administrators to restrict access to content from within a network.
(Short Answer)
4.9/5
(39)
In order to keep the Web server inside the internal network, direct all HTTP requests to the internal filtering firewall and configure the internal filtering router/firewall to allow only that device to access the internal Web server. _________________________
(True/False)
4.8/5
(33)
Showing 1 - 20 of 106
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)