Exam 12: Protection Mechanisms
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program65 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
Which of the following is used in conjunction with an algorithm to make computer data secure from anybody except the intended recipient of the data?
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
A
List the most common firewall implementation architectures.
Free
(Essay)
4.9/5
(39)
Correct Answer:
Three architectural implementations of firewalls are especially common: single bastion hosts,screened-host firewalls,and screened-subnet firewalls.
The intermediate area between trusted and untrusted networks is referred to as which of the following?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
C
A(n)____________________ token uses a challenge-response system in which the server challenges the user with a number,that when entered into the token provides a response that provides access.
(Short Answer)
4.9/5
(37)
Which type of IDPS is also known as a behavior-based intrusion detection system?
(Multiple Choice)
4.8/5
(28)
____________ is a technology in which multiple real,routable external IP addresses are converted to special ranges of internal IP addresses,usually on a one-to-one basis.
(Essay)
4.9/5
(34)
A cryptographic method that incorporates mathematical operations involving both a public key and a private key to encipher or decipher a message.
(Multiple Choice)
4.9/5
(31)
Which of the following provides an identification card of sorts to clients who request services in a Kerberos system?
(Multiple Choice)
4.7/5
(33)
Was developed by Netscape in 1994 to provide security for online e-commerce transactions.
(Multiple Choice)
4.9/5
(34)
What is most commonly used for the goal of nonrepudiation in cryptography?
(Multiple Choice)
4.9/5
(38)
Which type of device allows only specific packets with a particular source,destination,and port address to pass through it.
(Multiple Choice)
4.8/5
(36)
What is the next phase of the preattack data gathering process after an attacker has collected all of an organization's Internet addresses?
(Multiple Choice)
4.8/5
(39)
What is the range of the well-known ports used by TCP and UDP?
(Multiple Choice)
4.8/5
(39)
Which of the following biometric authentication systems is the most accepted by users?
(Multiple Choice)
4.9/5
(31)
____________________ presents a threat to wireless communications,a practice that makes it prudent to use a wireless encryption protocol to prevent unauthorized use of your Wi-Fi network.
(Short Answer)
4.8/5
(40)
Which of the following is true about firewalls and their ability to adapt in a network?
(Multiple Choice)
4.8/5
(27)
You might put a proxy server in the __________________,which is exposed to the outside world,neither in the trusted nor untrusted network.
(Short Answer)
4.9/5
(28)
Which technology employs sockets to map internal private network addresses to a public address using a one-to-many mapping?
(Multiple Choice)
4.7/5
(29)
Which of the following is NOT among the three types of authentication mechanisms?
(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 61
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)