Exam 6: Security Technology: Access Controls, Firewalls, and VPNS

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

​Accountability is the matching of an authenticated entity to a list of information assets and corresponding access levels.

(True/False)
4.7/5
(39)

In static filtering, configuration rules must be manually created, sequenced, and modified within the firewall. _________________________

(True/False)
4.9/5
(39)

Authentication is a mechanism whereby unverified entities who seek access to a resource provide a label by which they are known to the system. _________________________

(True/False)
4.8/5
(33)

Which of the following versions of TACACS is still in use  

(Multiple Choice)
4.8/5
(34)

Using an application firewall means the associated Web server must be exposed to a higher level of risk by placing it in the DMZ.

(True/False)
4.7/5
(42)

The Remote ____________________ Dial-In User Service system centralizes the management of user authentication by placing the responsibility for authenticating each user in the central RADIUS server.

(Short Answer)
4.9/5
(39)
Showing 101 - 106 of 106
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)