Computer Architecture > EXAM > C700 Ch. 1,2,3,5,6,7 Plus Pretest Review (All)
C700 Ch. 1,2,3,5,6,7 Plus Pretest Review An outsider needs access to a resource hosted on your extranet. The outsider is stranger to you, but one of your largest distributors vouches for him. If you... allow him access to the resource, this is known as implementing what? - ✔✔Trusted third party Which of the following are common security objectives? - ✔✔Nonrepudiation Confidentiality Integrity Availability What is an asset? - ✔✔Anything used in a business task What is the benefit of learning to think like a hacker? - ✔✔Protecting vulnerabilities before they are compromised What is the most important characteristic of an effective security goal? - ✔✔It is written down Who is responsible for network security? - ✔✔Everyone What distinguishes workgroups from client/server networks? (In other words, what feature is common to one of these but not both?) - ✔✔Centralized authentication Remote control is to thin clients as remote access is to? - ✔✔VPN What two terms are closely associated with VPNs? - ✔✔Tunneling and encapsulation What is a difference between a DMZ and an extranet? - ✔✔VPN required for access Which of the following is allowed under NAC if a host is lacking a security patch? - ✔✔Access to remediation servers What elements of network design have the greatest risk of causing a DoS? (Select two.) - ✔✔Bottlenecks Single point of failure For what type of threat are there no current defenses? - ✔✔Zero dayWhat is true about all security components and devices? - ✔✔They all have flaws or limitations. Which of the following is true regarding a Layer 2 address and Layer 3 address? - ✔✔Network Layer address is at Layer 3 and is rotatable Which of the following are not benefits of IPv6? - ✔✔RFC 1918 address What is the most common default security stance employed on firewalls? - ✔✔Denying by default, allowing by exception What is egress filtering? - ✔✔Examining traffic as it leaves a network Which of the following is not a feature of a proxy server? - ✔✔MAC address filtering What is another term for the individual rules in a firewall rule set? - ✔✔Exceptions Which of the following is not associated with a firewall? - ✔✔Fail-open A firewall is designed to allow what type of traffic to traverse its interfaces? - ✔✔Authorized What is the first step in deploying a firewall? - ✔✔Writing a security policy Which of the following is the best description of a firewall? - ✔✔A sentry device A border firewall cannot protect against which of the following? - ✔✔Insider attacking another internal target All of the following are mistakes in firewall security except: - ✔✔Using firewalls to provide filtering for networks and hosts Which of the following will prevent firewall filtering from blocking malicious content? - ✔✔Encrypted traffic What is the primary reason a firewall is an essential security product? - ✔✔Threats exist [Show More]
Last updated: 2 years ago
Preview 1 out of 27 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jul 08, 2022
Number of pages
27
Written in
This document has been written for:
Uploaded
Jul 08, 2022
Downloads
0
Views
113
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·