ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 8 Weeks Ago, 1 Day Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 27 Apr 2017 My Price 8.00

common security objectives

 

  • Which of the following are common security objectives?
    • Nonrepudiation
    • Confidentiality
    • Integrity
    • Availability
    • All of the above
  • What is an asset?
    • Anything used in a business task
    • Only objects of monetary value
    • A business process
    • Job descriptions
    • Security policy
  • Remote control is to thin clients as remote access is to?
    • NAC
    • VPN
    • DNS
    • IPS
    • ACL
  • What is another term for the individual rules in a firewall rule set?
    • States
    • Exceptions
    • Policies
    • Referrals
    • Sentries
  • Which of the following is not associated with a firewall?
    • Fail-secure
    • Sentry device
    • Fail-open
    • Chokepoint
    • Filtering service
  • A firewall is designed to allow what type of traffic to traverse its interfaces?
    • Authorized
    •  Non-benign
    • Unknown
    • Abnormal
    • Malicious
  • Which of the following is not ensured or provided by a secured VPN?
    • Confidentiality
    • Quality of service
    • Integrity
    • Privacy
    • Authentication
  • What form of VPN deployment requires additional authentication for accessing resources across the VPN?
    • Site-to-site VPN
    • Corporate firewall
    • Host-to-site VPN
    • Edge router
    • Remote access VPN
  • What form of cryptography encrypts the bulk of data transmitted between VPN end points?
    • Symmetric
    • Hashing
    • Public key
    • Transport mode
    • Asymmetric
  • The default-deny rule appears where in the rule set?
    • First
    • After any explicit Allow rules
    • Anywhere
    • Last
    • After any explicit deny rules
  • What mechanism allows a firewall to hand off authentication to a dedicated service hosted on a different system?
    • IEEE 802.11
    • RFC 1918
    • IEEE 802.1X
    • RFC 1492
    • IEE 802.3
  • When an organization first deploys a firewall and chooses to begin logging activity and what should you include in the log file?
    • Only malicious traffic
    • Only DoS traffic
    • Only dropped packets
    • Only allowed packets
    • All events
  • A firewall policy performs all the following functions except:
    • Assisting in troubleshooting
    • Placing blame for intrusions
    • Guiding installation
    • Ensuring consistent filtering across infrastructure
    • Detecting changes in deployed settings
  • Which of the following is not a viable option for an enterprise network that needs to control and filter network traffic?
    • Virtual firewall
    • Appliance firewall
    • Physical firewall
    • Host firewall
    • Software firewall
  • All of the following are considered firewall management best practices except:
    • Have a written policy
    • Provide open communications
    • Maintain physical access control
    • Don’t make assumptions
    • Develop a check list
  • All of the following are firewall management best practices except:
    • Lock. Then watch.
    • Back up, back up, back up
    • Keep it simple
    • Perform penetration testing
    •  Implement fail-open response
  • Appliance firewalls are only and always commercial firewalls.
    • True
    • False
  • The best authentication method for client VPN is __________________.
  • A solution that permitted in the industry to extend the life of IPv4 address is ______________.
  • Smooth Wall does not work well with Mozilla Firefox and Google Chrome.
    • True
    • False  

Answers

(11)
Status NEW Posted 27 Apr 2017 08:04 AM My Price 8.00

-----------

Not Rated(0)