Exam 8: Implementing the Bastion Host
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
Tripwire is an example of a ____ system.
Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
C
Bastion hosts should contain the latest and most expensive processor/memory combinations.
Free
(True/False)
4.9/5
(30)
Correct Answer:
False
If a network administrator is most comfortable with UNIX, he or she should choose a bastion host running ____.
Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
A
Match each item with a statement below.
-Rate at which the logic circuitry or microprocessor within a computing device processes the basic instructions that make the device operate.
(Multiple Choice)
4.9/5
(36)
It is a best practice idea to rename the ____ account on a bastion host after initial configuration.
(Multiple Choice)
4.8/5
(36)
Its not uncommon for companies to solicit information from a dozen or more hosting services and then request full proposals from five of those companies.
(True/False)
4.7/5
(40)
The Microsoft ____ allows system owners to tap into a large knowledge base of details about vulnerabilities and get advice from vendor and security experts on how to make specific Microsoft operating systems and layered products like databases and Web servers more secure.
(Multiple Choice)
4.9/5
(45)
Where should a bastion host be located if an organization does not have a dedicated server room?
(Multiple Choice)
4.8/5
(37)
When selcting a bastion host operating system, the most important consideration is ____.
(Multiple Choice)
4.9/5
(32)
A ____, which is a mirror image of all the data on a hard disk or partition, including not only files but applications and system data.
(Multiple Choice)
4.9/5
(35)
UNIX uses a utility called ____________________, which automates the process of analyzing security patches that are already on the system and reports patches that should be added.
(Short Answer)
4.8/5
(36)
A ____ server is a machine that is placed in the DMZ to attract hackers and direct them away from the servers being protected.
(Multiple Choice)
4.8/5
(36)
A ____ is a level of performance that you consider acceptable and against which the system can be compared.
a.log file
b.system audit
c.quality assurance test
d.baseline
(Short Answer)
4.7/5
(43)
What questions should you ask when evaluating the effectiveness of a bastion host configuration?
(Essay)
4.8/5
(39)
Match each item with a statement below.
-Standard for logging program message.
(Multiple Choice)
4.7/5
(35)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)