Module 5 Chapter 13,14,15 Network Security, Firewalls and VPN Second Edition

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is a minimum requirement for running SmoothWall?

512 MB PC SDRAM

Which of the following characteristics relates to Kerberos?

A computer network authentication protocol that allows nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

Which of the following characteristics relates to mobile IP?

A standard communications protocol designed to let mobile devices users move from one network to another while maintaining a permanent IP address.

Which type of firewall is designed to control input, output, and/or access to an application?

Application firewall

Which of the following identifies a user based on anatomical characteristics such as a fingerprint, a voice print, or iris patterns?

Biometrics

Which of the following is a solution that represents the majority of VPNs on the market and is commonly referred to as a VPN appliance? This solution is easy to set up, manage, and maintain.

CPE

Which of the following deals with keeping information, networks, and systems secure from unauthorized access?

Confidentiality

Which of the following is a key feature of SmoothWall?

Cybercash support

What is meant by synchronous Dynamic Random Access Memory (SDRAM)?

Dynamic random access memory that has a synchronous interface.

Which of the following refers to a public interest research group in Washington, D.C. that was established in 1994 to preserve the right of privacy in the electronic age as well as to give individuals greater control over personal information?

EPIC

Which of the following links customers, suppliers, partners, or communities of interest to a corporate intranet over a shared infrastructure?

Extranet VPNs

Which of the following is used to connect two offices in different locations?

Gateway-to-Gateway vpn

Which of the following is a collection of honeypots used to present an attacker an even more realistic attack environment?

Honeynet

For which of the following does the mobile user take specific actions to connect to the VPN?

Host-to-gateway vpn

Which of the following is an IPSec-based VPN protocol that uses NAT traversal (NAT-T)?

IKEv2

Which name is given to an architectural framework for delivering IP multimedia services?

IP multimedia subsystem (IMS)

Which of the following detects unauthorized user activities, attacks, and network compromises, alerts of the detected attacks, and takes action to prevent breaches?

IPS

Which of the following is a public location that sells Internet access?

Internet cafe

Which of the following allows file-sharing functionality?

LogMeIn

Which of the following is a method for encapsulating IPSec ESP packets into UDP packets to pass through routers or firewalls employing Network Address Translation (NAT)?

NAT-T

Which of the following is as an architecture that is designed to limit a network's vulnerability to eavesdropping and traffic analysis?

Onion routing

Which of the following refers to a database tool intended to handle time-series data, such as network bandwidth, temperatures, CPU load, and so on?

RRDTool

Which of the following is a Microsoft remote control solution used for modern operating systems that allows help desk professionals or other IT administrators to remotely control a user's system, while the user is watching?

Remote Assistance

Which of the following risks can compromise the confidentiality of documents stored on the server?

Risk that information about the server can be accessed

Which of the following is a popular open-source intrusion detection system that runs on SmoothWall??

SNORT

Which of the following requires PKI support and is used for encryption with newer tunneling protocols?

SSTP

Which of the following is a Microsoft solution that runs on a Microsoft Terminal Services server but appears, to end users, as if it were actually running on their systems?

TS RemoteApp

Which of the following allows administrators to connect remotely into servers from their desktop computers?

Terminal services for administration

Describe the three tenets of information security.

The three tenets of information security are of the C-I-A triangle. C-confidentiality means to secure all assets from unauthorized users. This will include strong encryption, authentication, and stringent access controls. I-intergrity means to ensure the information is protected against any unauthorized users or changes made by mistake. A-availability means the assets are available to users when they need it.

Which of the following refers to a series of tools and techniques used to prevent forensic examination from identifying an attack or attacker?

anti-forensics

The term Electronic Privacy Information Center (EPIC) refers to a form of the digital subscriber line technology, which enables faster data transmission over copper telephone lines than a conventional voice band modem can provide.

false

Which of the following is a system that waits for an IDS to detect and attackers and then transfers the attackers to a special host where they cannot do damage to the production environment?

padded cell

Which of the following will generate a graph of network traffic every five minutes on a firewall?

smoothwall

Which term describes a distributed data protection technology that leverages deep analysis, context evaluation, and rules configured from a central console to ensure confidential information remains secure while in use, in transit, and at rest?

DLP

Which of the following is a physical or logical subnetwork that contains and exposes an organization's external services to a larger untrusted network, usually the Internet?

DMZ

If an external server needs to communicate with servers inside the green zone, which network setting on SmoothWall can be opened?

DMZ pinhole

Which of the following is a Microsoft solution that can be used as an alternative to a traditional Internet Engineering Task Force (IETF) VPN?

DirectAccess

Which name is given to a set of communications standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network?

ISDN

Which term describes a set of concepts and practices that provides detailed descriptions and comprehensive checklists, tasks, and procedures for common IT practices?

ITIL

What are digital forensic techniques?

Identifying, extracting, and evaluating evidence obtained from digital media such as computer hard drives.

Which of the following offers keycard security and allows you to restrict the times that your computer can be remotely accessed?

NTRconnect

In SmoothWall, what color network interface card indicates the segment of the network is not trusted, but shares the Internet connection?

Orange

Which of the following is a proprietary protocol developed by Microsoft that provides a user with a graphical interface to another computer?

RDP

What must be enabled to test SmoothWall's capability to mitigate attacks?

Snort intrusion detection software

A gateway-to-gateway VPN provides connectivity between two locations such as a main office and a branch office.

TRUE

CERT, SANS, and Symantec are excellent network security Web sites.

TRUE

Which of the following allows a single server to host one or more applications for remoter users?

Terminal services for applications

In addition to providing network security, organizations must address what other type of security issue?

Transaction security

Connecting port 22 or 222 with a client such as WinSCP3 will allow SmoothWall which capability?

Transferring files via SCP/SFTP

Which of the following describes a VPN?

a hardware and software solution for remote workers, providing users with a data-encrypted gateway through a firewall and into a corporate network

What term is used to describe a chipset developed and promoted by the U.S. government from 1993 to 1996 as an encryption device to be adopted by telecommunications companies for voice transmission?

clipper chip

Which of the following is the term that describes the consistency, accuracy, and validity of data or information?

integrity

Which of the following is a third-party tool that Symantec offers as a solution for organizations to access and securely manage remote computers?

pcAnywhere

The degree to which a firewall can impose user access restrictions is known as which of the following?

privilege control

Which of the following will track every single connection outside the Web by IP address and URL?

proxy server

The volume of data throughput and transmission speed associated with a firewall is considered what?

scalability

Which of the following involves writing hidden messages so that only the sender and intended recipient know a message exists?

steganography

Clipper Chip was a chipset developed and promoted by the U.S. government as an encryption device to be adopted by telecommunications companies for voice transmission and was discontinued in 1996.

true

Digital forensic techniques identify, extract, and evaluate evidence obtained from digital media such as computer hard drives, CDs, DVDs, and other digital storage devices.

true

Tor was derived from the Onion Routing Project managed by the U.S. Naval Research Lab.

true

When implementing VPNs, you should not disable unneeded services or protocols.

true

Which of the following monitors traffic that gets through the screening firewall and has the advantage of reducing the amount of traffic to be monitored?

unfiltered IDS/IPS installation


संबंधित स्टडी सेट्स

Vsim Carla Hernandez Pre/Post-test

View Set

PN NCLEX 6th Edition- Leadership/Ethical/Legal

View Set

Final Practice Questions, Module 5, Module 4, Module 7, Module 2, Module 1

View Set

Biology Chapter 8 possible multiple choice questions

View Set

european history midterm Mckinnis

View Set

motors 2-7 motor branch circuit protection

View Set

Chemistry SUCCESS, Chemistry BOC, Hematology - Success Questions, Hematology Comprehensive BOC, Success- Hemostasis, education (success, boc & harr)

View Set

Abeka 3rd Grade History Test 6 (Revised)

View Set