Deck 8: Implementing the Bastion Host
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/49
Play
Full screen (f)
Deck 8: Implementing the Bastion Host
1
Tripwire is an example of a ____ system.
A) Linux
B) AIX
C) intrusion detection and prevention
D) operating
A) Linux
B) AIX
C) intrusion detection and prevention
D) operating
C
2
A ____ server is a machine that is placed in the DMZ to attract hackers and direct them away from the servers being protected.
A) flytrap
B) DNS server
C) honeypot
D) bastion host
A) flytrap
B) DNS server
C) honeypot
D) bastion host
C
3
The ___ lists newly discovered security advisories right on its home page.
A) Microsoft Institute
B) FreeBSD Project
C) SANS Institute
D) U.S. Department of Energy's Cyber Incident Response Capability
A) Microsoft Institute
B) FreeBSD Project
C) SANS Institute
D) U.S. Department of Energy's Cyber Incident Response Capability
D
4
If a network administrator is most comfortable with UNIX, he or she should choose a bastion host running ____.
A) UNIX
B) Windows
C) Linux
D) MacOS
A) UNIX
B) Windows
C) Linux
D) MacOS
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
5
You can check your computer's system information for the clock speed of your processor, which may be called the ____.
A) Central Processing Unit (CPU)
B) hard drive
C) data cache
D) lookaside buffer
A) Central Processing Unit (CPU)
B) hard drive
C) data cache
D) lookaside buffer
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
6
The industry standard for bastion host memory is between 4 GB and 8 GB of RAM depending on the ____ of the memory.
A) size
B) speed
C) manufacturer
D) all of these are correct
A) size
B) speed
C) manufacturer
D) all of these are correct
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
7
The concept of ____ requires hardening the system at multiple levels to minimize the possibility of intrusion.
A) Demilitarized Zones
B) healthy paranoia
C) virtual private networks
D) defense in depth
A) Demilitarized Zones
B) healthy paranoia
C) virtual private networks
D) defense in depth
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
8
When selcting a bastion host operating system, the most important consideration is ____.
A) Choose UNIX/LINUX only
B) Choose Windows only
C) Choose the OS you're most familiar with
D) Choose the OS that is the most cost effective
A) Choose UNIX/LINUX only
B) Choose Windows only
C) Choose the OS you're most familiar with
D) Choose the OS that is the most cost effective
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
9
Its not uncommon for companies to solicit information from a dozen or more hosting services and then request full proposals from five of those companies.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
10
Once you have configured and deployed a bastion host, there is no need for further maintenance.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
11
What is a downside of co-location for the bastion host?
A) more complicated for the administrator
B) not as much protection from natural disasters
C) decreased network uptime
D) weaker security
A) more complicated for the administrator
B) not as much protection from natural disasters
C) decreased network uptime
D) weaker security
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
12
The ____ utility reports on the services that are currently started.
A) Security Compliance Manager
B) chkconfig
C) syslog
D) daemon
A) Security Compliance Manager
B) chkconfig
C) syslog
D) daemon
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
13
Hard drives for rack-mounted servers range from $250 to $750 per terabyte depending on ____.
A) manufacturer
B) drive speed
C) form factor
D) all of these are correct
A) manufacturer
B) drive speed
C) form factor
D) all of these are correct
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
14
In general, where should bastion hosts be located on the network?
A) within the internal LAN
B) DMZ
C) before the router
D) between the router and firewall
A) within the internal LAN
B) DMZ
C) before the router
D) between the router and firewall
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
15
The first step in securing a bastion host is:.
A) Obtain a mcahine with sufficient memory and processor speed.
B) Run a security audit
C) Install the services to provide or modify existing services
D) back up the system and all data on it, including log files
A) Obtain a mcahine with sufficient memory and processor speed.
B) Run a security audit
C) Install the services to provide or modify existing services
D) back up the system and all data on it, including log files
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
16
DNS server located on the DMZ should be configured to prohibit unauthorized ____.
A) partitions
B) log files
C) backups
D) zone transfers
A) partitions
B) log files
C) backups
D) zone transfers
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
17
Where should a bastion host be located if an organization does not have a dedicated server room?
A) manager's office
B) network administrator's cubicle
C) offsite
D) locked server cabinet
A) manager's office
B) network administrator's cubicle
C) offsite
D) locked server cabinet
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
18
Network administrators should leave all ports open on a bastion host for maximum network throughput.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
19
Bastion hosts should contain the latest and most expensive processor/memory combinations.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
20
Windows Server 2003 and 2008 are excellent choices for bastion host operating systems because of their reliability and widespread use as servers
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
21
Match each item with a statement below.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
Standard for logging program message.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
Standard for logging program message.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
22
On a Windows bastion host, consider creating two ____________________: one for the operating system and one for the Web server, DNS server, or other software you plan to run on the host.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
23
The ____________________ location is defined as the exact building and room in which the device is located.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
24
Match each item with a statement below.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
Speed up the retrieval and storage of stored data.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
Speed up the retrieval and storage of stored data.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
25
Match each item with a statement below.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
Speeds up the processing of executable instructions.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
Speeds up the processing of executable instructions.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
26
Match each item with a statement below.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
Speeds up the translation of virtual-to-physical address for both data and instructions.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
Speeds up the translation of virtual-to-physical address for both data and instructions.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
27
UNIX uses a utility called ____________________, which automates the process of analyzing security patches that are already on the system and reports patches that should be added.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
28
Match each item with a statement below.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
No-man's-land between the inside and outside networks that serves as a buffer against outside attacks.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
No-man's-land between the inside and outside networks that serves as a buffer against outside attacks.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
29
On a bastion host that is intended to function as a Web server, for instance, you only need to enable traffic on TCP Port 80 and Port ____ for SSL traffic.
A) 79
B) 81
C) 443
D) 450
A) 79
B) 81
C) 443
D) 450
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
30
Match each item with a statement below.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
System specifically designed and implemented to withstand attacks.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
System specifically designed and implemented to withstand attacks.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
31
Discuss the pros and cons of having more than one bastion host.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
32
A ____ is a level of performance that you consider acceptable and against which the system can be compared.
a.log file
b.system audit
c.quality assurance test
d.baseline
a.log file
b.system audit
c.quality assurance test
d.baseline
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
33
Match each item with a statement below.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
Rate at which the logic circuitry or microprocessor within a computing device processes the basic instructions that make the device operate.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
Rate at which the logic circuitry or microprocessor within a computing device processes the basic instructions that make the device operate.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
34
____________________ occurs when a company physically hosts its server(s) in a data center that is managed by a third party.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
35
Match each item with a statement below.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
Most popular operating system used to provide services on the Internet.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
Most popular operating system used to provide services on the Internet.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
36
A ____, which is a mirror image of all the data on a hard disk or partition, including not only files but applications and system data.
A) hard backup
B) binary drive image
C) network backup
D) system state backup
A) hard backup
B) binary drive image
C) network backup
D) system state backup
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
37
Match each item with a statement below.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
Records detailing who accessed resources on the server and when the access attempts occurred.
a.instruction cache
b.log files
c.translation lookaside buffer
d.data cache
e.Demilitarized Zone
f.bastion host
g.UNIX
h.processor speed
i.syslog daemon
Records detailing who accessed resources on the server and when the access attempts occurred.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
38
The Microsoft ____ allows system owners to tap into a large knowledge base of details about vulnerabilities and get advice from vendor and security experts on how to make specific Microsoft operating systems and layered products like databases and Web servers more secure.
A) Security Assessment Tool
B) Baseline Security Analyzer
C) Trusted Computing Base
D) security_patch_check
A) Security Assessment Tool
B) Baseline Security Analyzer
C) Trusted Computing Base
D) security_patch_check
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
39
On a UNIX host, you should run a ____ check, a set of software programs that makes sure any software you're running on your system is a trusted program.
A) Security Assessment Tool
B) Baseline Security Analyzer
C) Trusted Computing Base
D) security_patch_check
A) Security Assessment Tool
B) Baseline Security Analyzer
C) Trusted Computing Base
D) security_patch_check
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
40
It is a best practice idea to rename the ____ account on a bastion host after initial configuration.
A) Administrator
B) Guest
C) Default
D) System
A) Administrator
B) Guest
C) Default
D) System
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
41
Why might it be a good idea to re-install the operating system on a bastion host?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
42
What type of processor speed is best for a bastion host?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
43
What type of fees do hosting service charge?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
44
What tools are available for Windows-based bastion hosts?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
45
What questions should you ask when evaluating the effectiveness of a bastion host configuration?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
46
What type of documentation should you keep for your bastion host?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
47
Why is it a good idea to disable user accounts on the bastion host?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
48
Where should a bastion host be located?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
49
Describe the RAM needs of a bastion host.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck