Exam 6: Security Technology: Access Controls, Firewalls, and VPNS
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
Accountability is the matching of an authenticated entity to a list of information assets and corresponding access levels.
(True/False)
4.7/5
(39)
In static filtering, configuration rules must be manually created, sequenced, and modified within the firewall. _________________________
(True/False)
4.9/5
(39)
Authentication is a mechanism whereby unverified entities who seek access to a resource provide a label by which they are known to the system. _________________________
(True/False)
4.8/5
(33)
Using an application firewall means the associated Web server must be exposed to a higher level of risk by placing it in the DMZ.
(True/False)
4.7/5
(42)
The Remote ____________________ Dial-In User Service system centralizes the management of user authentication by placing the responsibility for authenticating each user in the central RADIUS server.
(Short Answer)
4.9/5
(39)
Showing 101 - 106 of 106
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)