Exam 6: Security Technology: Access Controls, Firewalls, and VPNS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The service within Kerberos that generates and issues session keys is known as __________.

(Multiple Choice)
4.8/5
(37)

A trusted VPN uses  ____________________ circuits from a service provider who gives contractual assurance that no one else is allowed to use these circuits and that they are properly maintained and protected.

(Short Answer)
4.9/5
(34)

​Lattice-based access control is a form of access control in which users are assigned a matrix of authorizations for particular areas of access.

(True/False)
4.9/5
(26)

A(n) ____________________ dialer is an automatic phone-dialing program that dials every number in a configured range and checks to see if a person, answering machine, or modem picks up.

(Short Answer)
4.7/5
(42)

When Web services are offered outside the firewall, HTTP traffic should be blocked from internal networks through the use of some form of proxy access or DMZ architecture.

(True/False)
4.9/5
(34)

Discretionary access control is an approach whereby the organization specifies use of resources based on the assignment of data classification schemes to resources and clearance levels to users.

(True/False)
4.9/5
(39)

Configuring firewall policies is viewed as much as a(n) __________ as it is a(n) __________.

(Multiple Choice)
4.8/5
(33)

The firewall device must never be accessible directly from the ____________________ network.

(Short Answer)
4.8/5
(32)

The ____________________ packet-filtering firewall can react to an emergent event and update or create rules to deal with that event.

(Short Answer)
4.9/5
(42)

Good firewall rules include denying all data that is not verifiably authentic.

(True/False)
4.8/5
(38)

A(n) ____________________ contains a computer chip that can verify and validate several pieces of information instead of just a PIN.

(Short Answer)
4.7/5
(40)

The static packet filtering firewall can react to an emergent event and update or create rules to deal with that event. _________________________

(True/False)
4.8/5
(37)

The dominant architecture used to secure network access today is the __________ firewall.

(Multiple Choice)
4.9/5
(40)

Good policy and practice dictates that each firewall device, whether a filtering router, bastion host, or other firewall implementation, must have its own set of configuration rules.

(True/False)
4.8/5
(43)

Most firewalls use packet header information to determine whether a specific packet should be allowed to pass through or should be dropped. _________________________

(True/False)
4.7/5
(38)

In __________ mode, the data within an IP packet is encrypted, but the header information is not.

(Multiple Choice)
4.7/5
(45)

Known as the ping service, ICMP is a(n) __________ and should be ___________.

(Multiple Choice)
4.8/5
(40)

The __________ is an intermediate area between a trusted network and an untrusted network.

(Multiple Choice)
4.8/5
(42)

A(n) ____________________ private network is a secure network connection between systems that uses the data communication capability of an unsecured and public network.

(Short Answer)
4.9/5
(37)

Best practices in firewall rule set configuration state that the firewall device never allows administrative access directly from the public network. _________________________

(True/False)
4.9/5
(41)
Showing 41 - 60 of 106
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)