Question 1
____ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.Selected Answer:
FuzzCorrect Answer:
FuzzQuestion 2
____ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.Selected Answer:
Packet-filteringCorrect Answer:
Packet-filteringQuestion 3
In ____ mode, the data within an IP packet is encrypted, but the header information is not.Selected Answer:
transportCorrect Answer:
transportQuestion 4
Activities that scan network locales for active systems and then identify the network services offered by the host systems is known as ____.Selected Answer:
fingerprintingCorrect Answer:
fingerprintingQuestion 5
The dominant architecture used to secure network access today is the ____ firewall.Selected Answer:
screened subnetCorrect Answer:
screened subnetQuestion 6
Best practices in firewall rule set configuration state that the firewall device is never accessible directly from the public network.Selected Answer:
TrueCorrect Answer:
TrueQuestion 7
A VPN allows a user to turn the Internet into a private network.Selected Answer:
TrueCorrect Answer:
TrueQuestion 8
____ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.Selected Answer:
HIDPSsCorrect Answer:
HIDPSsQuestion 9
A ____ filtering firewall can react to an emergent event and update or create rules to deal with the event.Selected Answer:
dynamicCorrect Answer:
dynamicQuestion 10
A passive response is a definitive action automatically initiated when certain types of alerts are triggered.Selected Answer:
FalseCorrect Answer:
FalseQuestion 11
The application firewall runs special software that acts as a proxy for a service request.Selected Answer:
TrueCorrect Answer:
TrueQuestion 12
____ inspection firewalls keep track of each network connection between internal and external systems.Selected Answer:
StatefulCorrect Answer:
StatefulQuestion 13
____ are decoy systems designed to lure potential attackers away from critical systems.Selected Answer:
HoneypotsCorrect Answer:
HoneypotsQuestion 14
The statistical anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.Selected Answer:
TrueCorrect Answer:
TrueQuestion 15
Intrusion detection consists of procedures and systems that identify system intrusions and take action when an intrusion is detected.Selected Answer:
FalseCorrect Answer:
FalseQuestion 16
A(n) NIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing.Selected Answer:
FalseCorrect Answer:
False
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY CH6-7
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment