100%(3)3 out of 3 people found this document helpful
This preview shows page 3 - 5 out of 5 pages.
Question 101 out of 1 pointsLattice-based access control is a form of access control in which users are assigned a matrix of authorizations for particular areas of access.Selected Answer:TrueAnswers:TrueFalseQuestion 111 out of 1 pointsWhich of the following is not a major processing-mode category for firewalls?Question 121 out of 1 pointsA routingtable tracks the state and context of each packet in the conversation by recording which station sent what packet and when. _________________________
Question 131 out of 1 pointsSince the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the __________ host.Question 141 out of 1 pointsKerberos __________ provides tickets to clients who request services.Selected Answer:b. TGSAnswers:a. ASb. TGSc. VPNd. KDSQuestion 151 out of 1 pointsThe popular use for tunnelmode VPNs is the end-to-end transport of encrypted data. _________________________Question 161 out of 1 points
The dominant architecture used to secure network access today is the __________ firewall.