Countermeasures Chapter 10

Ace your homework & exams now with Quizwiz!

Which of the following can hide internal IP addresses from the internet.

NAT Proxy servers

A screening router would be an appropriate choice for meeting the security needs of a ________________.

None of the above

For which of the following reasons would you consider creating a protected subnet within an already protected internal network?

to protect customer information to protect management servers to protect the company's reputation to protect the web servers

Which of the following functions can a bastion host perform?

FTP server e-mail server

A bastion host is usually located on the internal network? True or False

False

In a Cisco ASA 5505 firewall, security level 100 is the least secure level. True or False

False

To isolate all external Web requests to a specific Web sever on the DMZ, it would be best to use many - to - one NAT? true or false

False

Which of the following issues should you consider in firewall design.

Fault Tolerance Log Size Authorization Load Balancing

Which of the following computers is likely to be found in a DMZ?

E-mail server Web server

Hardening a bastion host involves which of the following measures?

disabling unnecessary services removing unnecessary accounts Installing current patches all of the above

A proxy server ___________.

Is designed to improve web access Can filter Application layer content

What enables servers in a server farm to work together to handle requests?

Load balancing software

A DMZ is _________________

Semi Trusted network

What is the main problem with using a screening router?

The router alone cannot stop many types of attacks

Given the multiple and varied demands on network administrators, those in charge of small-to-medium sized networks should probably purchase a vendor-supplied turn-key perimeter firewall solution.

True

A corporation with several branch offices has decided to maintain multiple firewalls, one to protect each branch office's network. What is the most efficient way to maintain these firewalls?

Use a centralized security workstation


Related study sets

Anatomy and Physiology I - Chapter 10 Learnsmart

View Set