Question 1
____ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.Selected Answer: 
 FuzzCorrect Answer: 
 FuzzQuestion 2
____ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.Selected Answer: 
 Packet-filteringCorrect Answer: 
 Packet-filteringQuestion 3
In ____ mode, the data within an IP packet is encrypted, but the header information is not.Selected Answer: 
 transportCorrect Answer: 
 transportQuestion 4
Activities that scan network locales for active systems and then identify the network services offered by the host systems is known as ____.Selected Answer: 
 fingerprintingCorrect Answer: 
 fingerprintingQuestion 5
The dominant architecture used to secure network access today is the ____ firewall.Selected Answer: 
 screened subnetCorrect Answer: 
 screened subnetQuestion 6
Best practices in firewall rule set configuration state that the firewall device is never accessible directly from the public network.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 7
A VPN allows a user to turn the Internet into a private network.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 8
____ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.Selected Answer: 
 HIDPSsCorrect Answer: 
 HIDPSsQuestion 9
A ____ filtering firewall can react to an emergent event and update or create rules to deal with the event.Selected Answer: 
 dynamicCorrect Answer: 
 dynamicQuestion 10
A passive response is a definitive action automatically initiated when certain types of alerts are triggered.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 11
The application firewall runs special software that acts as a proxy for a service request.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 12
____ inspection firewalls keep track of each network connection between internal and external systems.Selected Answer: 
 StatefulCorrect Answer: 
 StatefulQuestion 13
____ are decoy systems designed to lure potential attackers away from critical systems.Selected Answer: 
 HoneypotsCorrect Answer: 
 HoneypotsQuestion 14
The statistical anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 15
Intrusion detection consists of procedures and systems that identify system intrusions and take action when an intrusion is detected.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 16
A(n) NIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing.Selected Answer: 
 FalseCorrect Answer: 
 False
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY CH6-7
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment