Exam 6: Security Technology: Access Controls, Firewalls, and VPNS
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
The ____________________ authentication system is named after the three-headed dog of Greek mythology that guards the gates to the underworld.
(Short Answer)
4.9/5
(31)
__________ inspection firewalls keep track of each network connection between internal and external systems.
(Multiple Choice)
4.9/5
(34)
The application firewall is also known as a(n) ____________________ server.
(Short Answer)
4.9/5
(36)
The presence of external requests for Telnet services can indicate a potential attack. _________________________
(True/False)
4.9/5
(43)
A content filter, also known as a reverse firewall, is a network device that allows administrators to restrict access to external content from within a network.
(True/False)
4.8/5
(26)
A VPN, used properly, allows use of the Internet as if it were a private network.
(True/False)
4.8/5
(37)
The popular use for tunnel mode VPNs is the end-to-end transport of encrypted data. _________________________
(True/False)
4.8/5
(31)
Access control is achieved by means of a combination of policies, programs, and technologies. _________________________
(True/False)
4.8/5
(39)
A(n) ____________________ is a combination of hardware and software that filters or prevents specific information from moving between the outside world and the inside world.
(Short Answer)
4.8/5
(36)
The ability of a router to restrict traffic to a specific service is an advanced capability and not considered a standard feature for most routers.
(True/False)
4.8/5
(39)
In most common implementation models, the content filter has two components: __________.
(Multiple Choice)
5.0/5
(36)
The DMZ can be a dedicated port on the firewall device linking a single bastion host.
(True/False)
4.8/5
(39)
Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal servers from the public network.
(Short Answer)
4.9/5
(40)
Even if Kerberos servers are subjected to denial-of-service attacks, a client can still request additional services.
(True/False)
4.7/5
(37)
The application layer proxy firewall is capable of functioning both as a firewall and an application layer proxy server.
(True/False)
4.7/5
(45)
Firewalls can be categorized by processing mode, development era, or structure.
(True/False)
4.8/5
(44)
Packet-filtering firewalls scan network data packets looking for compliance with the rules of the firewall's database or violations of those rules.
(True/False)
4.8/5
(47)
A __________ filtering firewall can react to an emergent event and update or create rules to deal with the event.
(Multiple Choice)
4.9/5
(25)
__________ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.
(Multiple Choice)
4.9/5
(33)
__________ firewalls are designed to operate at the media access control sublayer of the data link layer of the OSI network model.
(Multiple Choice)
4.7/5
(34)
Showing 81 - 100 of 106
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)