Exam 6: Security Technology: Access Controls, Firewalls, and VPNS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) intranet ​is a segment of the DMZ where additional authentication and authorization controls are put into place to provide services that are not available to the general public. _________________________

(True/False)
4.8/5
(36)

____________________ firewalls combine the elements of other types of firewalls-that is, the elements of packet filtering and proxy services, or of packet filtering and circuit gateways.

(Short Answer)
4.8/5
(40)

A routing table tracks the state and context of each packet in the conversation by recording which station sent what packet and when. _________________________

(True/False)
4.8/5
(33)

A firewall cannot be deployed as a separate network containing a number of supporting devices.

(True/False)
4.8/5
(37)

SESAME, as described in RFC 4120, keeps a database containing the private keys of clients and servers-in the case of a client, this key is simply the client's encrypted password. _________________________

(True/False)
4.8/5
(28)

As organizations implement cloud-based IT solutions, bring your own device (BYOD) options for employees, and other emerging network solutions, the network perimeter may be ____________________ for them.

(Short Answer)
4.8/5
(49)

Secure VPNs use security protocols and encrypt traffic transmitted across unsecured public networks like the Internet. _________________________

(True/False)
4.9/5
(36)

Authentication is the process of validating and verifying an unauthenticated entity's purported identity.

(True/False)
4.9/5
(42)

An attacker who suspects that an organization has dial-up lines can use a device called a(n) war dialer to locate the connection points. _________________________

(True/False)
4.7/5
(43)

Which of the following is not a major processing mode category for firewalls  

(Multiple Choice)
4.8/5
(29)

Syntax errors in firewall policies are usually difficult to identify.

(True/False)
4.7/5
(31)

Briefly describe the best practice rules for firewall use.

(Essay)
4.8/5
(41)

The application layer proxy firewall is also known as a(n) __________.

(Multiple Choice)
4.8/5
(36)

A(n) __________ is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.

(Multiple Choice)
4.7/5
(33)

A packet-____________________ firewall installed on a TCP/IP-based network typically functions at the IP level and determines whether to drop a packet (deny) or forward it to the next network connection (allow) based on the rules programmed into the firewall.

(Short Answer)
4.8/5
(38)

Kerberos __________ provides tickets to clients who request services.

(Multiple Choice)
4.8/5
(36)

Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the __________ host.

(Multiple Choice)
4.9/5
(34)

The proxy server is often placed in an unsecured area of the network or is placed in the __________ zone.

(Multiple Choice)
4.8/5
(40)

In SESAME, the user is first authenticated to an authentication server and receives a token. The token is then presented to a privilege attribute server as proof of identity to gain a(n) __________.

(Multiple Choice)
4.8/5
(40)

SESAME uses ____________________ key encryption to distribute secret keys.

(Short Answer)
4.9/5
(43)
Showing 21 - 40 of 106
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)