chap 6 and 7 quiz.docx - Question 1 1 out of 1 points Configuring firewall policies is viewed as much as a(n as it is a(n Selected Answer c Answers a

chap 6 and 7 quiz.docx - Question 1 1 out of 1 points...

This preview shows page 1 - 5 out of 43 pages.

Question 1 1 out of 1 points Configuring firewall policies is viewed as much as a(n) __________ as it is a(n) __________. Selected Answer: c. art, science Answers: a. skill, science b. philosophy, skill c. art, science d. pain, necessity Question 2 1 out of 1 points A(n) intranet is a segment of the DMZ where additional authentication and authorization controls are put into place to provide services that are not available to the general public. _________________________ Selected Answer: Fals e Answers: True Fals e Question 3 1 out of 1 points __________ inspection firewalls keep track of each network connection between internal and external systems. Selected Answer: b. Stateful Answers: a. Stateless b. Stateful c. Dynamic d. Static Question 4 0 out of 1 points In order to keep the Web server inside the internal network, direct all HTTP requests to the internal filtering firewall and configure the internal filtering router/firewall to allow only that device to access the internal Web server. _________________________ Selected Answer: True
Image of page 1
Answers: True Fals e Question 5 1 out of 1 points A VPN, used properly, allows use of the Internet as if it were a private network. Selected Answer: True Answers: True Fals e Question 6 1 out of 1 points An extranet is a segment of the DMZ where no authentication and authorization controls are put into place. Selected Answer: Fals e Answers: True Fals e Question 7 1 out of 1 points The false reject rate describes the number of legitimate users who are denied access because of a failure in the biometric device. _________________________ Selected Answer: True Answers: True Fals e Question 8 1 out of 1 points A(n) __________ is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. Selected Answer: a. VPN Answers: a. VPN b. SESAME c. SVPN d. KERBES Question 9 1 out of 1 points
Image of page 2
The primary benefit of a VPN that uses _________ is that an intercepted packet reveals nothing about the true destination system. Selected Answer: b. tunnel mode Answers: a. intermediate mode b. tunnel mode c. reversion mode d. transport mode Question 10 1 out of 1 points All organizations with a router at the boundary between the organization’s internal networks and the external service provider will experience improved network performance due to the complexity of the ACLs used to filter the packets. Selected Answer: Fals e Answers: True Fals e Question 1 1 out of 1 points Internet connections via dial-up lines are regaining popularity due to recent technological developments. Selected Answer: Fals e Answers: True Fals e Question 2 1 out of 1 points Kerberos uses asymmetric key encryption to validate an individual user to various network resources. _________________________ Selected Answer: Fals e Answers: True Fals e Question 3 1 out of 1 points Task-based controls are associated with the assigned role a user performs in an organization, such as a position or temporary assignment like project manager.
Image of page 3
Selected Answer: Fals e Answers: True Fals e Question 4 1 out of 1 points Some firewalls can filter packets by protocol name.
Image of page 4
Image of page 5

You've reached the end of your free preview.

Want to read all 43 pages?

  • Fall '18
  • Dr. Morris
  • Virtual private network, Simple Network Management Protocol, NIDPSs

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture