Telecommunication and Information Technology > Final Exam Review > University of the Cumberlands EMISS ISOL532 Telecommunications and Network Security. Final Exam. 50  (All)

University of the Cumberlands EMISS ISOL532 Telecommunications and Network Security. Final Exam. 50 Q&A

Document Content and Description Below

QUESTION 1 1. Simulator tests are secure by design. True False 2.00000 points QUESTION 2 1. Which of the following characteristics relates to Kerberos? A computer network authentication protoco... l that allows nodes communicating over a non-secure network to prove their identity to one another in a secure manner A public interest research group in Washington, D.C., established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and Constitutional values in the information age A round-robin database tool intended to handle time-series data like network bandwidth, temperatures, CPU load, and so on. Dynamic random access memory (DRAM) that has a synchronous interface 2.00000 points QUESTION 3 1. One of the most important steps in VPN troubleshooting is documenting processes and procedures. True False 2.00000 points QUESTION 4 1. Which of the following is a system that waits for an IDS to detect and attackers and then transfers the attackers to a special host where they cannot do damage to the production environment? Padded cell Honeypot Honeynet OpenVPN 2.00000 points QUESTION 5 1. Which of the following characteristics relates to enumeration? The process of discovering sufficient details about a potential target to learn about network or system vulnerabilities An application attack in which a hacker submits SQL expressions to cause authentication bypass, extraction of data, planting of information, or access to a command shell A criminal whose objective is to compromise IT infrastructures A logical division of data composed of one or more sectors on a hard drive 2.00000 points QUESTION 6 1. If the process of creating rules requires a significant number of special exceptions to modify or adjust ranges of addresses or ports, what should you do? Use a more complex rule set. Consider reconfiguring the network rather than using a too complex or too long rule set. Use a longer rule set. Don't use any addresses or ports. 2.00000 points QUESTION 7 1. What is compression? A VPN used to grant outside entities access into a perimeter network; used to host resources designated as accessible to a limited group of external entities, such as business partners or suppliers, but not the general public A subset of asymmetric cryptography based on the use of key pair sets The art and science of hiding information from unauthorized third parties Removal of redundant or superfluous data or space to reduce the size of a data set 2.00000 points QUESTION 8 1. Telnet is a protocol and a service used to remotely control or administer a host through a plaintext command-line interface. True False 2.00000 points QUESTION 9 1. When placing firewalls, you should consider the structure of the network, traffic patterns on the network, Internet connectivity, and remote access. True False 2.00000 points QUESTION 10 1. Which of the following can improve firewall performance? Firewalking Load balancing Port-Based Network Access (Admission) Control (PNAC) Wirespeed 2.00000 points QUESTION 11 1. NTFS is a storage device file system developed by Apple Inc. for use on Macintosh computers; it supports multiple resource forks for file objects. True False 2.00000 points QUESTION 12 1. Which of the following negotiates, creates, and manages security associations? Layer 2 Tunneling Protocol (L2TP) Point-to-Point Tunneling Protocol (PPTP) Authentication Header (AH) Internet Key Exchange (IKE) 2.00000 points QUESTION 13 1. Which of the following characteristics describes an edge router? The last device owned and controlled by an organization before an ISP or telco connection A form of VPN establishing a secure VPN over trusted VPN connections A form of cryptography in which each encryption key is used once before being discarded A security service that ensures that a sender cannot deny sending a message 2.00000 points QUESTION 14 1. Which of the following is an operating system built exclusively to run on a bastion host device? Proprietary OS General OS Reverse proxy Appliance firewall 2.00000 points QUESTION 15 1. TCP is responsible for providing reliable transmissions from one system to another, and IP is responsible for addressing and route selection. True False 2.00000 points QUESTION 16 1. When employees have multiple concurrent connections, what might be happening to the VPN system? There may be a software failure. Employees may be trying to access the system from remote locations. There may be a security issue. There may be a hardware failure. 2.00000 points QUESTION 17 1. Which of the following documents an organization's rules for using a VPN? Hairpinning Remote access policy Service level agreement Vaporware 2.00000 points QUESTION 18 1. Anonymity is the capability for a network or system user to remain unknown. True False 2.00000 points QUESTION 19 1. Which of the following is given to an Application Layer protocol used by e-mail clients to receive messages from an e-mail server? Simple Mail Transfer Protocol (SMTP) Post Office Protocol (POP) Transmission Control Protocol/Internet Protocol (TCP/IP) File Transfer Protocol (FTP) 2.00000 points QUESTION 20 1. Which of the following creates copies of data on other storage media? Fail-Open Honeynets Backups Security Technical Implementation Guide (STIGS) 2.00000 points QUESTION 21 1. Which one of the following is not a commercial hot firewall option available for Linux? SmoothWall IPFire Kaspersky Internet Security IPCop 2.00000 points QUEST ION 22 1. Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, and enter a secure network with little or no trouble because it is entering from a secure and verified endpoint? Hairpinning Anonymity Slideware Service Level Agreement (SLA) 2.00000 points QUESTION 23 1. To write a comprehensive security policy, you should first inventory and examine the components of the IT infrastructure. True False 2.00000 points QUESTION 24 1. If you do not eliminate personal communications, business functions can continue unhindered. True False 2.00000 points QUESTION 25 1. Which name is given to a form of filtering that focuses on traffic content? Stateful inspection filtering Static filtering Content filtering Application gateway 2.00000 points QUESTION 26 1. Deploying a security product is more preferable than addressing your environment’s specific risks. True False 2.00000 points QUESTION 27 1. Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, although not for the outermost IP header? Point-to-Point Protocol (PPP) Layer 2 Forwarding (L2F) Protocol Point-to-Point Tunneling Protocol (PPTP) Encapsulating Security Payload (ESP) 2.00000 points QUESTION 28 1. Which one of the following is not a benefit of having a written firewall policy? It acts as a tool for assisting in troubleshooting. It serves as a guideline for detecting changes and differences. It defines how to use a reverse proxy to add an additional layer of protection and control between Internet-based users and internally hosted servers. It ensures consistent filtering across firewalls. 2.00000 points QUEST ION 29 1. When considering transaction security, it is common for the web server to stand behind one firewall and the database server to stand behind a second firewall. True False 2.00000 points QUEST ION 30 1. Which of the following describes fair queuing? A technique of load balancing that operates by sending the next transaction to the firewall with the least current workload. An event that triggers an alarm but should not have because the traffic or event actually is benign. A form of IDS/IPS detection based on a collection of samples, patterns, signatures, and so on. A written expression of an item of concern (protocol, port, service, application, user, and IP address) and one or more actions to take when the item of concern appears in traffic. 2.00000 points QUESTION 31 1. Windows Firewall is a native operating system firewall. True False 2.00000 points QUESTION 32 1. Which of the following is the term that describes the consistency, accuracy, and validity of data or information? Authenticati on Availability Confidentiali ty Integrity 2.00000 points QUESTION 33 1. A proxy server can track every single connection outside the Web by IP address and the URL requested. True False 2.00000 points QUESTION 34 1. Security through obscurity can be both a good strategy and a bad one depending on the type of security. True False 2.00000 points QUESTION 35 1. A dual-homed firewall describes a firewall that has three network interfaces. Each network interface is located in a unique network segment. This allows for true isolation of the segments and forces the firewall to filter all traffic traversing from one segment to another. True False 2.00000 points QUESTION 36 1. The IPv6 IPSec is a set of national standards that use cryptographic security services to provide confidentiality, data origin authentication and data integrity. True False 2.00000 points QUESTION 37 1. Free software can have no cost, which makes it non-commercial. True False 2.00000 points QUESTION 38 1. The goal of disaster recovery planning is to return the business to functional operation within a limited time to prevent the failure of the organization due to the incident. True False 2.00000 points QUESTION 39 1. VPN hardware can suffer from an unsecured default configuration or misconfiguration. True False 2.00000 points QUESTION 40 1. Years ago, security threats came from mostly unsophisticated attackers; today, organized crime is taking advantage of computer hacking. True False 2.00000 points QUESTION 41 1. Which of the following refers to a type of firewall that filters on a specific application’s content and session information? Circuit firewall Hardware firewall Application firewall Stateful inspection 2.00000 points QUESTION 42 1. Identity proofing is a form of authentication. True False 2.00000 points QUESTION 43 1. Which term describes the cumulative value of an asset based on both tangible and intangible values? Asset value (AV) Exposure factor (EF) Single loss expectancy (SLE) Packet 2.00000 points QUESTION 44 1. A host VPN is a VPN that establishes a secure VPN over trusted VPN connections. True False 2.00000 points QUESTION 45 1. What is a business continuity plan? A plan explaining the use of only a single element of validation or verification to prove the identity of a subject. A plan outlining the failure response that results in open and unrestricted access or communication. A plan to maintain the mission-critical functions of the organization in the event of a problem that threatens to take business processes offline. A plan to restore the mission-critical functions of the organization once they have been interrupted by an adverse event. 2.00000 points QUESTION 46 1. Which name is given to a set of communications standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network? National Security Agency (NSA) Asymmetric Digital Subscriber Line (ADSL) Integrated Services Digital Network (ISDN) Clipper Chip 2.00000 points QUESTION 47 1. Which of the following describes identity and access management (IAM)? The security discipline that enables the right individuals to access the right resources at the right times consistent with organizational policy Portions of a software system that unauthenticated users can run A form of security based on hiding details of a system or creating convolutions that are difficult to understand to overcome the obscure methodology A policy of allowing or even encouraging employees, contractors, and others to connect their own computers, smartphones, and other devices to their organization’s networks 2.00000 points QUESTION 48 1. A gateway-to-gateway VPN provides connectivity between two locations such as a main office and a branch office. True False 2.00000 points QUESTION 49 1. Which of the following terms refers to the process of securing or locking down a host against threats and attacks? Auditing Redundanc y Authorizati on Hardening 2.00000 points QUESTION 50 1. The degree to which a firewall can impose user access restrictions is known as which of the following? Security assurance Privilege control Authentication Audit capabilities [Show More]

Last updated: 2 years ago

Preview 1 out of 12 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$14.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

101
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 09, 2022

Number of pages

12

Written in

Seller


seller-icon
Kirsch

Member since 5 years

941 Documents Sold

Reviews Received
111
37
8
4
28
Additional information

This document has been written for:

Uploaded

Aug 09, 2022

Downloads

 0

Views

 101

Document Keyword Tags


$14.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·