Chapter 1 Lab - Donna Taylor IS3220 Unit 1 Assessment 1 An...

Info icon This preview shows pages 1–2. Sign up to view the full content.

Donna Taylor IS3220 Unit 1 Assessment 1. An outsider needs access to a resource hosted in your extranet. The outside is a stranger to you, but one of your largest distributors vouches for them. If you allow them access to the resource, this is known as implementing what? C. Trusted Third Party. 2. Which of the following are common security objectives? E. All of the Above. 3. What is an asset? A. Anything used in a business task . 4. What is the benefit of learning to think like a hacker? B. Protecting vulnerabilities before they are compromised. 5. What is the most important part of an effective security goal? C. That it is written down. 6. What is true about every security component or device? E. They all have flaws and limitations. 7. Who is responsible for network security? D. Everyone. 8. What is a distinguishing feature between workgroups and client/server networks? B. Centralized authentication. 9. Remote control is to thin clients as remote access is to? B. VPN. 10. What two terms are closely associated with VPNs?
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

A. Tunneling and encapsulation.
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 11. What is a difference between a DMZ and an extranet? A. VPN required for access. 12. What is the primary security concern with wireless connections? E. Signal propagation. 13. What are two elements of network design that have the greatest risk of causing a DoS? B. Single point of failure. C. Bottlenecks. 14. For what type of threat are there no current defenses? D. Zero day. 15. Which of the following is true regarding a layer 2 address and layer 3 address? E. Both C and D are true. 16. Which of the following are not benefits of IPv6? B. RFC 1918 Address. 17. What is the most common default security stance employed on firewalls? D. Denying by default. 18. What is egress filtering? C. Examining traffic as it leaves a network. 19. Which of the following is not a feature of a proxy server? E. MAC Address Filtering. 20. Which of the following is allowed under NAC if a host is lacking a security patch? E. Access to remediation servers....
View Full Document

  • Spring '14
  • Computer network, IP address, Virtual private network, remote access, Computer network security

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern