Chapter 12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following statements best describes the location of a DMZ? A. A DMZ is located immediately behind your first Internet firewall. B. A DMZ is located immediately in front of your first Internet firewall. C. A DMZ is located immediately behind your first network active firewall. D. A DMZ is located immediately behind your first network passive Internet HTTP firewall.

A. A DMZ is located immediately behind your first Internet firewall.

Which of the following statements best describes a firewall? A. A firewall is a pass-through device that allows only certain traffic in and out. B. A firewall is a network segment off the firewall in which you put systems that require different levels of access than other network components. C. A firewall is an external DNS server. D. A firewall is a mail relay

A. A firewall is a pass-through device that allows only certain traffic in and out.

Which of the following statements best describes application-level firewalls? A. Application-level firewalls operate at OSI protocol Layer 7, the Application Layer. B. Application-level firewalls operate at OSI protocol Layer 6, the Presentation Layer. C. Application-level firewalls operate at OSI protocol Layer 5, the Session Layer. D. Application-level firewalls operate at OSI protocol Layer 4, the Transport Layer

A. Application-level firewalls operate at OSI protocol Layer 7, the Application Layer.

Which of the following terms is another name for a VPN? A. Tunnel B. One-time password C. Pipeline D. Bypass

A. Tunnel

Which of the following statements is true of IPSec? A. IPSec performs encryption and authentication. B. IPSec provides redundant security for IP-based networks. C. IPSec is an acronym for International Policy on Security Enforcement Committee. D. IPSec existed before the birth of the Internet

A. IPSec performs encryption and authentication.

Which of the following is the simplest type of firewall to implement? A. A stateful packet-filtering firewall B. A packet-filtering firewall C. A dual-homed host firewall D. An application gateway

B. A packet-filtering firewall

Which of the following ISO/OSI layers defines how to address the physical devices on the network? A. Session Layer B. Data Link Layer C. Application Layer D. Transport Layer

B. Data Link Layer

Which of the following statements best describes an extranet? A. An extranet is an intranet on steroids. B. An extranet is an intranet that provides extra services. C. An extranet is an intranet that allows specific users outside the network to access its services. D. None of the above.

C. An extranet is an intranet that allows specific users outside the network to access its services.

The Telecommunications, Network, and Internet Security domain of information security is also concerned with the prevention and detection of the misuse or abuse of systems, which poses a threat to the tenets of ______. A. Confidentiality, integrity, and entity (CIE) B. Confidentiality, integrity, and authenticity (CIA) C. Confidentiality, integrity, and availability (CIA) D. Confidentiality, integrity, and liability (CIL)

C. Confidentiality, integrity, and availability (CIA)

Which of the following advantages does a VPN offer? A. A VPN reduces the need for dedicated network connections (such as Frame Relay) and reduces the costs associated with network maintenance. B. A VPN is generally more secure than shared network services. C. A VPN allows employees and business partners access to the organization's network in a secure manner. D. All of the above.

D. All of the above.

Which of the following is most affected by denial-of-service (DoS) attacks? A. Confidentiality B. Integrity C. Accountability D. Availability

D. Availability

Which protocol of the TCP/IP suite addresses reliable data transport? A. Transmission Control Protocol (TCP) B. User Datagram Protocol (UDP) C. Internet Protocol (IP) D. Internet Control Message Protocol (ICMP)

D. Internet Control Message Protocol (ICMP)

ISO/OSI Layer 6 is which of the following? A. Application Layer B. Presentation Layer C. Data Link Layer D. Network Layer

B. Presentation Layer

Which of the following protocols does the Internet use? A. NAT B. ISO C. TCP/IP D. SSH

C. TCP/IP

Intrusion detection has which of the following sets of characteristics? A. It is adaptive rather than preventative. B. It is administrative rather than preventative. C. It is disruptive rather than preventative. D. It is detective rather than preventative

D. It is detective rather than preventative


Ensembles d'études connexes

Cognitive Psychology: Selective Attention

View Set

ECON 2100 EXAM 1 practice questions

View Set

Chapter 2: Interpersonal Communication and Emotional Intelligence

View Set

Chapter 23 - Evaluating Variances from Standard Costs

View Set