Telecommunication and Information Technology > Final Exam Review > University of the Cumberlands EMISS ISOL532 Telecommunications and Network Security. Final Exam. 50 (All)
QUESTION 1 1. Simulator tests are secure by design. True False 2.00000 points QUESTION 2 1. Which of the following characteristics relates to Kerberos? A computer network authentication protoco... l that allows nodes communicating over a non-secure network to prove their identity to one another in a secure manner A public interest research group in Washington, D.C., established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and Constitutional values in the information age A round-robin database tool intended to handle time-series data like network bandwidth, temperatures, CPU load, and so on. Dynamic random access memory (DRAM) that has a synchronous interface 2.00000 points QUESTION 3 1. One of the most important steps in VPN troubleshooting is documenting processes and procedures. True False 2.00000 points QUESTION 4 1. Which of the following is a system that waits for an IDS to detect and attackers and then transfers the attackers to a special host where they cannot do damage to the production environment? Padded cell Honeypot Honeynet OpenVPN 2.00000 points QUESTION 5 1. Which of the following characteristics relates to enumeration? The process of discovering sufficient details about a potential target to learn about network or system vulnerabilities An application attack in which a hacker submits SQL expressions to cause authentication bypass, extraction of data, planting of information, or access to a command shell A criminal whose objective is to compromise IT infrastructures A logical division of data composed of one or more sectors on a hard drive 2.00000 points QUESTION 6 1. If the process of creating rules requires a significant number of special exceptions to modify or adjust ranges of addresses or ports, what should you do? Use a more complex rule set. Consider reconfiguring the network rather than using a too complex or too long rule set. Use a longer rule set. Don't use any addresses or ports. 2.00000 points QUESTION 7 1. What is compression? A VPN used to grant outside entities access into a perimeter network; used to host resources designated as accessible to a limited group of external entities, such as business partners or suppliers, but not the general public A subset of asymmetric cryptography based on the use of key pair sets The art and science of hiding information from unauthorized third parties Removal of redundant or superfluous data or space to reduce the size of a data set 2.00000 points QUESTION 8 1. Telnet is a protocol and a service used to remotely control or administer a host through a plaintext command-line interface. True False 2.00000 points QUESTION 9 1. When placing firewalls, you should consider the structure of the network, traffic patterns on the network, Internet connectivity, and remote access. True False 2.00000 points QUESTION 10 1. Which of the following can improve firewall performance? Firewalking Load balancing Port-Based Network Access (Admission) Control (PNAC) Wirespeed 2.00000 points QUESTION 11 1. NTFS is a storage device file system developed by Apple Inc. for use on Macintosh computers; it supports multiple resource forks for file objects. True False 2.00000 points QUESTION 12 1. Which of the following negotiates, creates, and manages security associations? Layer 2 Tunneling Protocol (L2TP) Point-to-Point Tunneling Protocol (PPTP) Authentication Header (AH) Internet Key Exchange (IKE) 2.00000 points QUESTION 13 1. Which of the following characteristics describes an edge router? The last device owned and controlled by an organization before an ISP or telco connection A form of VPN establishing a secure VPN over trusted VPN connections A form of cryptography in which each encryption key is used once before being discarded A security service that ensures that a sender cannot deny sending a message 2.00000 points QUESTION 14 1. Which of the following is an operating system built exclusively to run on a bastion host device? Proprietary OS General OS Reverse proxy Appliance firewall 2.00000 points QUESTION 15 1. TCP is responsible for providing reliable transmissions from one system to another, and IP is responsible for addressing and route selection. True False 2.00000 points QUESTION 16 1. When employees have multiple concurrent connections, what might be happening to the VPN system? There may be a software failure. Employees may be trying to access the system from remote locations. There may be a security issue. There may be a hardware failure. 2.00000 points QUESTION 17 1. Which of the following documents an organization's rules for using a VPN? Hairpinning Remote access policy Service level agreement Vaporware 2.00000 points QUESTION 18 1. Anonymity is the capability for a network or system user to remain unknown. True False 2.00000 points QUESTION 19 1. Which of the following is given to an Application Layer protocol used by e-mail clients to receive messages from an e-mail server? Simple Mail Transfer Protocol (SMTP) Post Office Protocol (POP) Transmission Control Protocol/Internet Protocol (TCP/IP) File Transfer Protocol (FTP) 2.00000 points QUESTION 20 1. Which of the following creates copies of data on other storage media? Fail-Open Honeynets Backups Security Technical Implementation Guide (STIGS) 2.00000 points QUESTION 21 1. Which one of the following is not a commercial hot firewall option available for Linux? SmoothWall IPFire Kaspersky Internet Security IPCop 2.00000 points QUEST ION 22 1. Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, and enter a secure network with little or no trouble because it is entering from a secure and verified endpoint? Hairpinning Anonymity Slideware Service Level Agreement (SLA) 2.00000 points QUESTION 23 1. To write a comprehensive security policy, you should first inventory and examine the components of the IT infrastructure. True False 2.00000 points QUESTION 24 1. If you do not eliminate personal communications, business functions can continue unhindered. True False 2.00000 points QUESTION 25 1. Which name is given to a form of filtering that focuses on traffic content? Stateful inspection filtering Static filtering Content filtering Application gateway 2.00000 points QUESTION 26 1. Deploying a security product is more preferable than addressing your environment’s specific risks. True False 2.00000 points QUESTION 27 1. Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, although not for the outermost IP header? Point-to-Point Protocol (PPP) Layer 2 Forwarding (L2F) Protocol Point-to-Point Tunneling Protocol (PPTP) Encapsulating Security Payload (ESP) 2.00000 points QUESTION 28 1. Which one of the following is not a benefit of having a written firewall policy? It acts as a tool for assisting in troubleshooting. It serves as a guideline for detecting changes and differences. It defines how to use a reverse proxy to add an additional layer of protection and control between Internet-based users and internally hosted servers. It ensures consistent filtering across firewalls. 2.00000 points QUEST ION 29 1. When considering transaction security, it is common for the web server to stand behind one firewall and the database server to stand behind a second firewall. True False 2.00000 points QUEST ION 30 1. Which of the following describes fair queuing? A technique of load balancing that operates by sending the next transaction to the firewall with the least current workload. An event that triggers an alarm but should not have because the traffic or event actually is benign. A form of IDS/IPS detection based on a collection of samples, patterns, signatures, and so on. A written expression of an item of concern (protocol, port, service, application, user, and IP address) and one or more actions to take when the item of concern appears in traffic. 2.00000 points QUESTION 31 1. Windows Firewall is a native operating system firewall. True False 2.00000 points QUESTION 32 1. Which of the following is the term that describes the consistency, accuracy, and validity of data or information? Authenticati on Availability Confidentiali ty Integrity 2.00000 points QUESTION 33 1. A proxy server can track every single connection outside the Web by IP address and the URL requested. True False 2.00000 points QUESTION 34 1. Security through obscurity can be both a good strategy and a bad one depending on the type of security. True False 2.00000 points QUESTION 35 1. A dual-homed firewall describes a firewall that has three network interfaces. Each network interface is located in a unique network segment. This allows for true isolation of the segments and forces the firewall to filter all traffic traversing from one segment to another. True False 2.00000 points QUESTION 36 1. The IPv6 IPSec is a set of national standards that use cryptographic security services to provide confidentiality, data origin authentication and data integrity. True False 2.00000 points QUESTION 37 1. Free software can have no cost, which makes it non-commercial. True False 2.00000 points QUESTION 38 1. The goal of disaster recovery planning is to return the business to functional operation within a limited time to prevent the failure of the organization due to the incident. True False 2.00000 points QUESTION 39 1. VPN hardware can suffer from an unsecured default configuration or misconfiguration. True False 2.00000 points QUESTION 40 1. Years ago, security threats came from mostly unsophisticated attackers; today, organized crime is taking advantage of computer hacking. True False 2.00000 points QUESTION 41 1. Which of the following refers to a type of firewall that filters on a specific application’s content and session information? Circuit firewall Hardware firewall Application firewall Stateful inspection 2.00000 points QUESTION 42 1. Identity proofing is a form of authentication. True False 2.00000 points QUESTION 43 1. Which term describes the cumulative value of an asset based on both tangible and intangible values? Asset value (AV) Exposure factor (EF) Single loss expectancy (SLE) Packet 2.00000 points QUESTION 44 1. A host VPN is a VPN that establishes a secure VPN over trusted VPN connections. True False 2.00000 points QUESTION 45 1. What is a business continuity plan? A plan explaining the use of only a single element of validation or verification to prove the identity of a subject. A plan outlining the failure response that results in open and unrestricted access or communication. A plan to maintain the mission-critical functions of the organization in the event of a problem that threatens to take business processes offline. A plan to restore the mission-critical functions of the organization once they have been interrupted by an adverse event. 2.00000 points QUESTION 46 1. Which name is given to a set of communications standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network? National Security Agency (NSA) Asymmetric Digital Subscriber Line (ADSL) Integrated Services Digital Network (ISDN) Clipper Chip 2.00000 points QUESTION 47 1. Which of the following describes identity and access management (IAM)? The security discipline that enables the right individuals to access the right resources at the right times consistent with organizational policy Portions of a software system that unauthenticated users can run A form of security based on hiding details of a system or creating convolutions that are difficult to understand to overcome the obscure methodology A policy of allowing or even encouraging employees, contractors, and others to connect their own computers, smartphones, and other devices to their organization’s networks 2.00000 points QUESTION 48 1. A gateway-to-gateway VPN provides connectivity between two locations such as a main office and a branch office. True False 2.00000 points QUESTION 49 1. Which of the following terms refers to the process of securing or locking down a host against threats and attacks? Auditing Redundanc y Authorizati on Hardening 2.00000 points QUESTION 50 1. The degree to which a firewall can impose user access restrictions is known as which of the following? Security assurance Privilege control Authentication Audit capabilities [Show More]
Last updated: 2 years ago
Preview 1 out of 12 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 09, 2022
Number of pages
12
Written in
This document has been written for:
Uploaded
Aug 09, 2022
Downloads
0
Views
101
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·