Exam 8: Implementing the Bastion Host

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Tripwire is an example of a ____ system.

Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
Verified

C

Bastion hosts should contain the latest and most expensive processor/memory combinations.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

False

If a network administrator is most comfortable with UNIX, he or she should choose a bastion host running ____.

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

A

Match each item with a statement below. -Rate at which the logic circuitry or microprocessor within a computing device processes the basic instructions that make the device operate.

(Multiple Choice)
4.9/5
(36)

What is a downside of co-location for the bastion host?

(Multiple Choice)
4.8/5
(38)

It is a best practice idea to rename the ____ account on a bastion host after initial configuration.

(Multiple Choice)
4.8/5
(36)

Its not uncommon for companies to solicit information from a dozen or more hosting services and then request full proposals from five of those companies.

(True/False)
4.7/5
(40)

The Microsoft ____ allows system owners to tap into a large knowledge base of details about vulnerabilities and get advice from vendor and security experts on how to make specific Microsoft operating systems and layered products like databases and Web servers more secure.

(Multiple Choice)
4.9/5
(45)

Where should a bastion host be located?

(Essay)
4.7/5
(30)

Where should a bastion host be located if an organization does not have a dedicated server room?

(Multiple Choice)
4.8/5
(37)

When selcting a bastion host operating system, the most important consideration is ____.

(Multiple Choice)
4.9/5
(32)

What tools are available for Windows-based bastion hosts?

(Essay)
4.8/5
(34)

Discuss the pros and cons of having more than one bastion host.

(Essay)
4.9/5
(27)

A ____, which is a mirror image of all the data on a hard disk or partition, including not only files but applications and system data.

(Multiple Choice)
4.9/5
(35)

UNIX uses a utility called ____________________, which automates the process of analyzing security patches that are already on the system and reports patches that should be added.

(Short Answer)
4.8/5
(36)

A ____ server is a machine that is placed in the DMZ to attract hackers and direct them away from the servers being protected.

(Multiple Choice)
4.8/5
(36)

What type of processor speed is best for a bastion host?

(Essay)
4.9/5
(40)

A ____ is a level of performance that you consider acceptable and against which the system can be compared. a.log file b.system audit c.quality assurance test d.baseline

(Short Answer)
4.7/5
(43)

What questions should you ask when evaluating the effectiveness of a bastion host configuration?

(Essay)
4.8/5
(39)

Match each item with a statement below. -Standard for logging program message.

(Multiple Choice)
4.7/5
(35)
Showing 1 - 20 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)