Exam 6: Security Technology: Access Controls, Firewalls, and VPNS
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
A(n) intranet is a segment of the DMZ where additional authentication and authorization controls are put into place to provide services that are not available to the general public. _________________________
(True/False)
4.8/5
(36)
____________________ firewalls combine the elements of other types of firewalls-that is, the elements of packet filtering and proxy services, or of packet filtering and circuit gateways.
(Short Answer)
4.8/5
(40)
A routing table tracks the state and context of each packet in the conversation by recording which station sent what packet and when. _________________________
(True/False)
4.8/5
(33)
A firewall cannot be deployed as a separate network containing a number of supporting devices.
(True/False)
4.8/5
(37)
SESAME, as described in RFC 4120, keeps a database containing the private keys of clients and servers-in the case of a client, this key is simply the client's encrypted password. _________________________
(True/False)
4.8/5
(28)
As organizations implement cloud-based IT solutions, bring your own device (BYOD) options for employees, and other emerging network solutions, the network perimeter may be ____________________ for them.
(Short Answer)
4.8/5
(49)
Secure VPNs use security protocols and encrypt traffic transmitted across unsecured public networks like the Internet. _________________________
(True/False)
4.9/5
(36)
Authentication is the process of validating and verifying an unauthenticated entity's purported identity.
(True/False)
4.9/5
(42)
An attacker who suspects that an organization has dial-up lines can use a device called a(n) war dialer to locate the connection points. _________________________
(True/False)
4.7/5
(43)
Which of the following is not a major processing mode category for firewalls
(Multiple Choice)
4.8/5
(29)
Syntax errors in firewall policies are usually difficult to identify.
(True/False)
4.7/5
(31)
The application layer proxy firewall is also known as a(n) __________.
(Multiple Choice)
4.8/5
(36)
A(n) __________ is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.
(Multiple Choice)
4.7/5
(33)
A packet-____________________ firewall installed on a TCP/IP-based network typically functions at the IP level and determines whether to drop a packet (deny) or forward it to the next network connection (allow) based on the rules programmed into the firewall.
(Short Answer)
4.8/5
(38)
Kerberos __________ provides tickets to clients who request services.
(Multiple Choice)
4.8/5
(36)
Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the __________ host.
(Multiple Choice)
4.9/5
(34)
The proxy server is often placed in an unsecured area of the network or is placed in the __________ zone.
(Multiple Choice)
4.8/5
(40)
In SESAME, the user is first authenticated to an authentication server and receives a token. The token is then presented to a privilege attribute server as proof of identity to gain a(n) __________.
(Multiple Choice)
4.8/5
(40)
SESAME uses ____________________ key encryption to distribute secret keys.
(Short Answer)
4.9/5
(43)
Showing 21 - 40 of 106
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)