C700 Ch. 1,2,3,5,6,7 Plus Pretest Review
An outsider needs access to a resource hosted on your extranet. The outsider is
stranger to you, but one of your largest distributors vouches for him. If you allow him
access t
...
C700 Ch. 1,2,3,5,6,7 Plus Pretest Review
An outsider needs access to a resource hosted on your extranet. The outsider is
stranger to you, but one of your largest distributors vouches for him. If you allow him
access to the resource, this is known as implementing what? - ✔✔Trusted third party
Which of the following are common security objectives? - ✔✔Nonrepudiation
Confidentiality
Integrity
Availability
What is an asset? - ✔✔Anything used in a business task
What is the benefit of learning to think like a hacker? - ✔✔Protecting vulnerabilities
before they are compromised
What is the most important characteristic of an effective security goal? - ✔✔It is written
down
Who is responsible for network security? - ✔✔Everyone
What distinguishes workgroups from client/server networks? (In other words, what
feature is common to one of these but not both?) - ✔✔Centralized authentication
Remote control is to thin clients as remote access is to? - ✔✔VPN
What two terms are closely associated with VPNs? - ✔✔Tunneling and encapsulation
What is a difference between a DMZ and an extranet? - ✔✔VPN required for access
Which of the following is allowed under NAC if a host is lacking a security patch? -
✔✔Access to remediation servers
What elements of network design have the greatest risk of causing a DoS? (Select two.)
- ✔✔Bottlenecks
Single point of failure
For what type of threat are there no current defenses? - ✔✔Zero dayWhat is true about all security components and devices? - ✔✔They all have flaws or
limitations.
Which of the following is true regarding a Layer 2 address and Layer 3 address? -
✔✔Network Layer address is at Layer 3 and is rotatable
Which of the following are not benefits of IPv6? - ✔✔RFC 1918 address
What is the most common default security stance employed on firewalls? - ✔✔Denying
by default, allowing by exception
What is egress filtering? - ✔✔Examining traffic as it leaves a network
Which of the following is not a feature of a proxy server? - ✔✔MAC address filtering
What is another term for the individual rules in a firewall rule set? - ✔✔Exceptions
Which of the following is not associated with a firewall? - ✔✔Fail-open
A firewall is designed to allow what type of traffic to traverse its interfaces? -
✔✔Authorized
What is the first step in deploying a firewall? - ✔✔Writing a security policy
Which of the following is the best description of a firewall? - ✔✔A sentry device
A border firewall cannot protect against which of the following? - ✔✔Insider attacking
another internal target
All of the following are mistakes in firewall security except: - ✔✔Using firewalls to
provide filtering for networks and hosts
Which of the following will prevent firewall filtering from blocking malicious content? -
✔✔Encrypted traffic
What is the primary reason a firewall is an essential security product? - ✔✔Threats exist
[Show More]