Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security Study Set 2
Quiz 6: Security Technology: Access Controls, Firewalls, and Vpns
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 41
True/False
An attacker who suspects that an organization has dial-up lines can use a device called a(n) war dialer to locate the connection points. _________________________
Question 42
True/False
SESAME, as described in RFC 4120, keeps a database containing the private keys of clients and servers-in the case of a client, this key is simply the client's encrypted password. _________________________
Question 43
Multiple Choice
__________ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.
Question 44
True/False
Kerberos uses asymmetric key encryption to validate an individual user to various network resources. _________________________
Question 45
True/False
Traceroute, formally known as an ICMP Echo request, is used by internal systems administrators to ensure that clients and servers can communicate. _________________________
Question 46
True/False
The presence of external requests for Telnet services can indicate a potential attack. _________________________
Question 47
Multiple Choice
__________ access control is a form of __________ access control in which users are assigned a matrix of authorizations for particular areas of access.
Question 48
True/False
Best practices in firewall rule set configuration state that the firewall device never allows administrative access directly from the public network. _________________________
Question 49
True/False
When Web services are offered outside the firewall, SMTP traffic should be blocked from internal networks through the use of some form of proxy access or DMZ architecture. _________________________