ch6_review - Question 1 0 out of 0 points Kerberos uses asymmetric key encryption to validate an individual user to various network resources Selected

ch6_review - Question 1 0 out of 0 points Kerberos uses...

This preview shows page 1 - 4 out of 15 pages.

Question 10 out of 0 pointsKerberos uses asymmetrickey encryption to validate an individual user to various network resources. Question 20 out of 0 points____ firewalls are designed to operate at the media access control sublayer of the data link layer of the OSI network model. Question 30 out of 0 pointsIn addition to recording intrusion attempts, a(n) routercan be configured to use the contact information to notify the firewall administrator of the occurrence of an intrusion attempt. Question 40 out of 0 pointsBest practices in firewall rule set configuration state that the firewalldevice is never accessible directly from the public network. Question 50 out of 0 points____ and TACACS are systems that authenticate the credentials of users who are trying to access an organization’s network via a dial-up connection. Question 60 out of 0 pointsIn recent years, the broadband router devices that can function as packet-filtering firewalls have been enhanced to combine the features of ____.
Image of page 1
Question 7 0 out of 0 points The firewall can often be deployed as a separate network containing a number of supporting devices. Question 80 out of 0 pointsThe Cisco security kernel contains three component technologies: the Interceptor/Packet Analyzer, the Security Verification ENgine (SVEN), and Kernel Proxies. Question 9 0 out of 0 points The application gateway is also known as a(n) ____. Question 10 0 out of 0 points Firstgeneration firewalls are application-level firewalls. Question 110 out of 0 pointsA(n) perimeteris a segment of the DMZ where additional authentication and authorization controls are put into place to provide services that are not available to the general public. Question 120 out of 0 pointsThe popular use for tunnelmode VPNs is the end-to-end transport of encrypted data. Question 130 out of 0 points____ inspection firewalls keep track of each network connection between internal and external systems.
Image of page 2
Question 14 0 out of 0 points
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 15 pages?

  • Spring '15
  • TimEllis
  • bastion host, Packet filtering, dual-homed host

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture