CYB 220 - 4-2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Adding the /0 at the end of the network setting is equivalent to a subnet mask of - 255.0.0.0 - 0.0.0.0 - 255.255.255.0 - 255.255.255.255

0.0.0.0

What steps do you take to configure a NAT rule? - Click the arrow beside the Add button, configure the NAT rule, apply - Click the arrow beside the Add button, click OK - Click the Add button, click Add Nat Rule, apply - Click the Add button, configure the NAT Rule, click OK

Click the arrow beside the Add button, configure the NAT rule, apply

What device will be used to test access to the web server in the lab? - Client machine - Firewall - Switch - Router

Client machine

Which of the following will help against attacks on all firewalls? - Enabling anti-spoofing - Enabling tunneling - Enabling advanced options - Enabling access control lists

Enabling anti-spoofing

Which of the following devices should you use to keep machines behind it anonymous? (Select the best answer.) - Caching proxy - Circuit-level gateway - UTM - IP proxy

IP proxy

Where would an NIDS sit on a network? (Select the best answer.) - Inline - On the extranet - On the DMZ - Back to back

Inline

Which of the following should be used to filter out activities such as instant messaging? - IP proxy - Application-level gateway - Internet content filter - Honeypot

Internet content filter

Lattice-based access control is an example of what type of access control policy? - RBAC - Rule-based access control - MAC - DAC

MAC

Which of the following is an access control policy determined by a computer system and not by a user or owner? - MAC - Discretionary security policy - DAC - RBAC

MAC

Which type of firewall filter can match incoming traffic to the corresponding outbound IP address connection by way of IP address and port? - Application-level gateway - Circuit-level gateway - Packet filtering - NAT filtering

NAT filtering

Snort and Bro are examples of which of the following? - SPI - Proxy servers - Firewalls - NIDS

NIDS

Which of the following can detect malicious packets and discard them? - NIDS - PAT - NIPS - Proxy server

NIPS

In a discretionary access control model, who is in charge of setting permissions to a resource? - Administrator and the owner - Any user of the computer - Administrator - Owner of the resource

Owner of the resource

"Maximum and minimum password age" is part of which of the following? - Organizational unit - Registry - Password policy - Group policy editor

Password policy

Which of the following keeps every user in a standard user mode instead of administrator mode, even if the user is a member of the administrators group? - Password policy - Administrator policy - Vista access control - User Account Control

User Account Control

Which of the following is an example of a protocol analyzer? - Wireshark - HTTP proxy - ASA firewall - Syslog

Wireshark

What is the order of steps for configuring a security policy? - Set up access, management access, setting the system clock, anti-spoofing - Set up access, setting the system clock, management access, anti-spoofing - Set up access, anti-spoofing, setting the system clock, management access - Setting the system clock, anti-spoofing, set up access, management access

Set up access, anti-spoofing, setting the system clock, management access

Which of the following is the strongest password? - This1sV#ryS3cure - Marqu1sD3S0d - |ocrian# - Thisisverysecure

This1sV#ryS3cure (password strength is based on length, then complexity)

What command is used to gain access to the global configuration mode on the firewall? - Terminal - Device configure - Enable - Configure terminal

Configure terminal

What key combination helps secure the logon process? - Ctrl+Alt+Del - Ctrl+Shift+Esc - Windows+R - Alt+F4

Ctrl+Alt+Del

The Cisco ASA device is a: - Router - Firewall - Server - Switch

Firewall

Which of the following should be your primary line of defense in network security? - Proxy server - NIPS - Firewall - Protocol analyzer

Firewall

James has detected a network intrusion in his company. What should he check first? - Performance logs - Firewall logs - Event viewer - DNS logs

Firewall logs

Which of the following should not be included in a password when making it complex? - Numbers - Function keys - Special characters - Uppercase letters

Function keys

A client computer uses the IP address 10.254.254.189. It has made a connection to a web server by opening the outbound port 1589. The server uses the IP address 65.19.28.154. You want to filter out any HTTP packets coming from the server. Which IP address and port should you specify to be filtered on the firewall? - 65.19.28.154:80 - 10.254.254.189:80 - 10.254.254.189:1589 - 65.19.28.154:1589

65.19.28.154:80 (The reason is because 65 is the server address sending traffic BACK to the client coming FROM the server. The TO server port would be 1589, but typically a server sends back the requested information on port 80 Port 80 is the port number assigned to commonly used internet communication protocol, Hypertext Transfer Protocol (HTTP). It is the default network port used to send and receive unencrypted web pages.)

Which of the following access control policies is based on sets of permissions involved in an operation? - MAC - DAC - RBAC - Rule-based access control

RBAC

Of the following, what is a good way to protect the computer? - Remove password policies. - Delete the administrator account. - Rename and password protect the administrator account. - Keep the guest account enabled.

Rename and password protect the administrator account.


Ensembles d'études connexes

More Data Structures and algorithms interview questions

View Set

American Government Unit 1 Study Guide

View Set

Unit Circle- Evaluating Trig Functions Of Degree Angles

View Set

Marketing Research Test Review Questions #1

View Set

Acute Kidney Injury and Chronic Kidney Disease (Ch. 34)

View Set

Ch. 15: Labor Relations and Collective Bargaining

View Set

fundamentals of business, marketing, and finance midterm review

View Set

ADV. MED SURGE Exam 4 (ch 32-40)

View Set

Biology 1409 - Lab Exam 2 - Lesson 6 through 13

View Set