Cryptography and Network Security

Computing

Quiz 21 :

Network Endpoint Security

Quiz 21 :

Network Endpoint Security

Question Type
search
arrow
Intrusion detection is the process of collecting information about events occurring in a computer system or network and analyzing them for signs of intrusions.
Free
True False
Answer:

Answer:

True

Tags
Choose question tag
close menu
arrow
One limitation of a firewall is that an improperly secured wireless LAN may be accessed from outside the organization.
Free
True False
Answer:

Answer:

True

Tags
Choose question tag
close menu
arrow
the primary benefit of a host-based IDS is that it can detect both external and internal intrusions.
Free
True False
Answer:

Answer:

True

Tags
Choose question tag
close menu
arrow
Packet filter firewalls are susceptible to security breaches caused by improper configurations.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the __________ defines the transport protocol.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
typically, a _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A __________ provides a location for monitoring security-related events.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
the internal firewall provides a measure of access control and protection for the DMZ systems consistent with their need for external connectivity.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the firewall provides an additional layer of defense, insulating internal systems from external networks or other parts of the internal network.
True False
Answer:
Tags
Choose question tag
close menu
arrow
__________ determines the direction in which particular service requests may be initiated and allowed to flow through the firewall.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Analyzers are responsible for collecting dat A.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A circuit-level gateway permits an end-to-end tCP connection.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the user control feature is typically applied to users outside the firewall perimeter.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Multiple internal firewalls can be used to protect portions of the internal network from each other.
True False
Answer:
Tags
Choose question tag
close menu
arrow
__________ controls how particular services are used.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A firewall may filter traffic on the basis of IP address, protocol, or port number.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Packet filter gateways tend to be more secure than application- level gateways.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A firewall may not act as a packet filter.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the first step in a DDoS attack is for the attacker to infect a number of machines with zombie software that will ultimately be used to carry out the attack.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A stateful packet inspection firewall reviews the same packet information as a packet filtering firewall, but also records information about tCP connections.
True False
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 45