Tuesday, January 14, 2014

CIS 481-20: INTRO TO INFORM SECURITY CH6-7

  • Question 1

    2 out of 2 points
    ____ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.
    Selected Answer:
    Correct 
    Fuzz
    Correct Answer:
    Correct Fuzz
  • Question 2

    2 out of 2 points
    ____ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.
    Selected Answer:
    Correct 
    Packet-filtering
    Correct Answer:
    Correct Packet-filtering
  • Question 3

    2 out of 2 points
    In ____ mode, the data within an IP packet is encrypted, but the header information is not.
    Selected Answer:
    Correct 
    transport
    Correct Answer:
    Correct transport
  • Question 4

    2 out of 2 points
    Activities that scan network locales for active systems and then identify the network services offered by the host systems is known as ____.
    Selected Answer:
    Correct 
    fingerprinting
    Correct Answer:
    Correct fingerprinting
  • Question 5

    2 out of 2 points
    The dominant architecture used to secure network access today is the ____ firewall.
    Selected Answer:
    Correct 
    screened subnet
    Correct Answer:
    Correct screened subnet
  • Question 6

    1 out of 1 points
    Best practices in firewall rule set configuration state that the firewall device is never accessible directly from the public network.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 7

    1 out of 1 points
    A VPN allows a user to turn the Internet into a private network.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 8

    2 out of 2 points
    ____ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.
    Selected Answer:
    Correct 
    HIDPSs
    Correct Answer:
    Correct HIDPSs
  • Question 9

    2 out of 2 points
    A ____ filtering firewall can react to an emergent event and update or create rules to deal with the event.
    Selected Answer:
    Correct 
    dynamic
    Correct Answer:
    Correct dynamic
  • Question 10

    1 out of 1 points
    A passive response is a definitive action automatically initiated when certain types of alerts are triggered.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 11

    1 out of 1 points
    The application firewall runs special software that acts as a proxy for a service request.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 12

    2 out of 2 points
    ____ inspection firewalls keep track of each network connection between internal and external systems.
    Selected Answer:
    Correct 
    Stateful
    Correct Answer:
    Correct Stateful
  • Question 13

    2 out of 2 points
    ____ are decoy systems designed to lure potential attackers away from critical systems.
    Selected Answer:
    Correct 
    Honeypots
    Correct Answer:
    Correct Honeypots
  • Question 14

    1 out of 1 points
    The statistical anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 15

    1 out of 1 points
    Intrusion detection consists of procedures and systems that identify system intrusions and take action when an intrusion is detected.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 16

    1 out of 1 points
    A(n) NIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False

No comments:

Post a Comment