Filters
Question type

Study Flashcards

_________________________ is designed to "provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality" (as defined in the network standard document, RFC 2406).

Correct Answer

verifed

verified

ESP (Encapsulating Security Pa...

View Answer

Which of the following organizations sponsors the Certified Information Systems Security Professional (CISSP) certification program?


A) American Society for Industrial Security (ASIS)
B) InfraGard
C) Information Systems Security Association (ISSA)
D) Information Security Forum (ISF)

Correct Answer

verifed

verified

Identify four tasks that can be fulfilled by a proxy server.

Correct Answer

verifed

verified

As a "middleman," a proxy can fulfill on...

View Answer

Stateless filtering screens on the basis of the context of the communication.

Correct Answer

verifed

verified

____ storage is employed by a computer system to house frequently used data for quick access.


A) RAM
B) Register
C) Cache
D) CD-ROM

Correct Answer

verifed

verified

A rogue Web site is one that performs unlawful activity or that puts the user who accesses it at risk.

Correct Answer

verifed

verified

What are the advantages of using Network Address Translation (NAT)?

Correct Answer

verifed

verified

Using NAT discourages attackers, because...

View Answer

How does a source routing attack work?

Correct Answer

verifed

verified

In a source routing attack, the attacker...

View Answer

A(n) ____ is information that a Web server stores on a client computer, such as the client's preferences when accessing a particular Web site, or where the client has been on the Web site.


A) applet
B) cookie
C) scanner
D) listener

Correct Answer

verifed

verified

Attacks on wireless networks are sometimes called ____ -drives because the attacker may drive around an area in a car, using a portable computer to attempt to pick up a wireless signal.


A) war
B) battle
C) spy
D) surveillance

Correct Answer

verifed

verified

A border ____ is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.


A) gateway
B) router
C) switch
D) hub

Correct Answer

verifed

verified

A set of filtering rules, called a ____, is applied to packets through the use of IPTables.


A) link
B) group
C) cluster
D) chain

Correct Answer

verifed

verified

____ engineering, in relation to computer system attacks, refers to the use of human interaction to gain access to a system or to do damage.


A) Social
B) Psychological
C) Interpersonal
D) Communications

Correct Answer

verifed

verified

A(n) ____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system.


A) remote procedure call
B) virus
C) error handler
D) hoax

Correct Answer

verifed

verified

Provide a general description for how routers are used in border security.

Correct Answer

verifed

verified

A router performs packet filtering and i...

View Answer

A(n)____________________ is a computer that is located between a computer on an internal network and a computer on an external network with which the internal computer is communicating.

Correct Answer

verifed

verified

Identify four network hardening techniques.

Correct Answer

verifed

verified

A sampling of network-hardening techniqu...

View Answer

Network devices such as switches use ____, so that when there is heavy network traffic, they have a means to store data until it can be forwarded to the right destination.


A) magnetic disks
B) registers
C) buffers
D) CD-ROMs

Correct Answer

verifed

verified

The NAT setup offers addresses in the ____ range as the default option.


A) 10.0.0.0
B) 172.16.0.0
C) 192.168.0.0
D) 224.0.0.0

Correct Answer

verifed

verified

A(n)_________________________ is a portion of a network that exists between two or more networks that have different security measures in place.

Correct Answer

verifed

verified

DMZ (demilitarized z...

View Answer

Showing 21 - 40 of 42

Related Exams

Show Answer