Exam 6: Security Technology: Access Controls, Firewalls, and VPNS
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
In Kerberos, a(n) ____________________ is an identification card for a particular client that verifies to the server that the client is requesting services and that the client is a valid member of the Kerberos system and therefore authorized to receive services.
(Short Answer)
4.9/5
(39)
When Web services are offered outside the firewall, SMTP traffic should be blocked from internal networks through the use of some form of proxy access or DMZ architecture. _________________________
(True/False)
4.8/5
(34)
The screened subnet protects the DMZ systems and information from outside threats by providing a network with intermediate security, which means the network is less secure than the general-public networks but more secure than the internal network.
(True/False)
4.9/5
(33)
Telnet protocol packets usually go to TCP port __________, whereas SMTP packets go to port __________.
(Multiple Choice)
4.8/5
(44)
A common DMZ arrangement is a subnet firewall that consists of two or more internal bastion hosts behind apacket-filtering router, with each host protecting the trusted network. _________________________
(True/False)
4.9/5
(37)
A content filter is essentially a set of scripts or programs that restricts user access to certain networking protocols and Internet locations.
(True/False)
4.8/5
(34)
The primary disadvantage of stateful packet inspection firewalls is the additional processing required to manage and verify packets against the state table. _________________________
(True/False)
4.8/5
(45)
An extranet is a segment of the DMZ where no authentication and authorization controls are put into place.
(True/False)
4.7/5
(36)
A ____________________ mode VPN establishes two perimeter tunnel servers to encrypt all traffic that will traverse an unsecured network. The entire client packet is encrypted and added as the data portion of a packet addressed from one tunneling server to another.
(Short Answer)
4.8/5
(36)
Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the ____________________ host.
(Short Answer)
4.9/5
(40)
All organizations with a router at the boundary between the organization's internal networks and the external service provider will experience improved network performance due to the complexity of the ACLs used to filter the packets.
(True/False)
4.7/5
(33)
What must a VPN accomplish to offer a secure and reliable capability while relying on public networks
(Essay)
4.8/5
(30)
Kerberos is based on the principle that the ____________________ knows the secret keys of all clients and servers on the network.
(Short Answer)
4.9/5
(46)
____________________ is a firewall type that keeps track of each network connection between internal and external systems using a table and that expedites the processing of those communications.
(Short Answer)
4.8/5
(40)
The primary benefit of a VPN that uses _________ is that an intercepted packet reveals nothing about the true destination system.
(Multiple Choice)
4.9/5
(42)
The false reject rate describes the number of legitimate users who are denied access because of a failure in the biometric device. _________________________
(True/False)
4.9/5
(35)
Though not used as much in Windows environments, terminal emulation is still useful to systems administrators on Unix/Linux systems.
(True/False)
4.8/5
(41)
Firewalls operate by examining a data packet and performing a comparison with some predetermined logical rules. _________________________
(True/False)
4.8/5
(34)
__________ access control is a form of __________ access control in which users are assigned a matrix of authorizations for particular areas of access.
(Multiple Choice)
4.8/5
(40)
When a bastion host approach is used, the host contains two NICs, forcing all traffic to go through the device. _________________________
(True/False)
4.8/5
(40)
Showing 61 - 80 of 106
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)