Exam 6: Security Technology: Access Controls, Firewalls, and VPNS
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
The service within Kerberos that generates and issues session keys is known as __________.
(Multiple Choice)
4.8/5
(37)
A trusted VPN uses ____________________ circuits from a service provider who gives contractual assurance that no one else is allowed to use these circuits and that they are properly maintained and protected.
(Short Answer)
4.9/5
(34)
Lattice-based access control is a form of access control in which users are assigned a matrix of authorizations for particular areas of access.
(True/False)
4.9/5
(26)
A(n) ____________________ dialer is an automatic phone-dialing program that dials every number in a configured range and checks to see if a person, answering machine, or modem picks up.
(Short Answer)
4.7/5
(42)
When Web services are offered outside the firewall, HTTP traffic should be blocked from internal networks through the use of some form of proxy access or DMZ architecture.
(True/False)
4.9/5
(34)
Discretionary access control is an approach whereby the organization specifies use of resources based on the assignment of data classification schemes to resources and clearance levels to users.
(True/False)
4.9/5
(39)
Configuring firewall policies is viewed as much as a(n) __________ as it is a(n) __________.
(Multiple Choice)
4.8/5
(33)
The firewall device must never be accessible directly from the ____________________ network.
(Short Answer)
4.8/5
(32)
The ____________________ packet-filtering firewall can react to an emergent event and update or create rules to deal with that event.
(Short Answer)
4.9/5
(42)
Good firewall rules include denying all data that is not verifiably authentic.
(True/False)
4.8/5
(38)
A(n) ____________________ contains a computer chip that can verify and validate several pieces of information instead of just a PIN.
(Short Answer)
4.7/5
(40)
The static packet filtering firewall can react to an emergent event and update or create rules to deal with that event. _________________________
(True/False)
4.8/5
(37)
The dominant architecture used to secure network access today is the __________ firewall.
(Multiple Choice)
4.9/5
(40)
Good policy and practice dictates that each firewall device, whether a filtering router, bastion host, or other firewall implementation, must have its own set of configuration rules.
(True/False)
4.8/5
(43)
Most firewalls use packet header information to determine whether a specific packet should be allowed to pass through or should be dropped. _________________________
(True/False)
4.7/5
(38)
In __________ mode, the data within an IP packet is encrypted, but the header information is not.
(Multiple Choice)
4.7/5
(45)
Known as the ping service, ICMP is a(n) __________ and should be ___________.
(Multiple Choice)
4.8/5
(40)
The __________ is an intermediate area between a trusted network and an untrusted network.
(Multiple Choice)
4.8/5
(42)
A(n) ____________________ private network is a secure network connection between systems that uses the data communication capability of an unsecured and public network.
(Short Answer)
4.9/5
(37)
Best practices in firewall rule set configuration state that the firewall device never allows administrative access directly from the public network. _________________________
(True/False)
4.9/5
(41)
Showing 41 - 60 of 106
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)