Telecommunication and Information Technology > QUESTIONS & ANSWERS > University of the Cumberlands EMISS ISOL532 Telecommunications and network security. Chapter 1 and 2 (All)
QUESTION 1 1. Which firewall product is designed for larger networks? Commercial firewalls Personal firewalls Sessions Appliance firewalls 5.00000 points QUESTION 2 1. The term zero day expl ... oit describes a new and previously unknown attack for which there is not a current specific defense. True False 5.00000 points QUESTION 3 1. A software firewall can protect a single host or a network of hosts, whereas a hardware firewall can protect only a single host. True False 5.00000 points QUESTION 4 1. The term bastion host refers to a firewall positioned along the pathway of a potential attack. It serves as the first line of defense for the network. True False 5.00000 points QUESTION 5 1. Encryption is the process or mechanism that grants or denies use of a resource. True False 5.00000 points QUESTION 6 1. Which malicious software program is distributed by hackers to take control of victims’ computers? Hardware firewalls Viruses Bots Bastion host 5.00000 points QUESTION 7 1. Which name is given to an entrance or exit point to a controlled space? Physical layer (Layer 1) Cost/Benefit Analysis Network layer (Layer 3) Gateway 5.00000 points QUESTION 8 1. Which of the following characteristics relates to a demilitarized zone (DMZ)? Confidence in the expectation that others will act in your best interest or that a resource is authentic A type of perimeter network used to host resources designated as accessible by the public from the Internet A form of networking where each computer is a peer A host on a network 5.00000 points QUESTION 9 1. Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network compromises. True False 5.00000 points QUESTION 10 1. Which of the following is the name given to unauthorized access to a system? Hijackin g Backdoo r Tunnelin g Exploit 5.00000 points QUESTION 11 1. A security policy is important for all of the following reasons except which one? It establishes goals. It helps with planning. With it, you cannot trust the network's security. It helps respond, contain, and repair. 5.00000 points QUESTION 12 1. The term asset value (AV) describes the cumulative value of an asset based on both tangible and intangible values. AV supports the SLE calculation. True False 5.00000 points QUESTION 13 1. Content filtering is a form of filtering that focuses on traffic content. True False 5.00000 points QUESTION 14 1. Which term is used to describe an attack that occurs when a hacker uses a network sniffer to watch a communications session to learn its parameters? HOSTS file Hijackin g Privacy Applianc e 5.00000 points QUESTION 15 1. Dynamic packet filtering is the process of automatically creating temporary filters. In most cases, the filters allow outbound responses to previous inbound requests. True False 5.00000 points QUESTION 16 1. Ingress filtering filters traffic as it attempts to enter a network, including spoofed addresses, malformed packets, unauthorized ports and protocols, and blocked destinations. True False 5.00000 points QUESTION 17 1. Which of the following characteristics relates to access control? The feature of network design that ensures the existence of multiple pathways of communication. An attack that occurs when a hacker uses a network sniffer to watch a communications session to learn its parameters The process or mechanism of granting or denying use of resources; typically applied to users or generic network traffic The process of confirming the identity of a user 5.00000 points QUESTION 18 1. Which of the following describes a blacklist? A security mechanism to detect and prevent attempts to breach security A type of filtering in which all activities or entities are permitted except those identified A list of the hosts and servers on the network A list that describes the steps to lock down a host against threats and attacks 5.00000 points QUESTION 19 1. Which term is used to describe a firewall that is implemented via software? Risk assessment Bump-in-thestack Hardware firewall Screening router 5.00000 points QUESTION 20 1. Which of the following refers to a host on a network that supports user interaction with the network? Serv er Role Trust Clien t Which term is used to describe a network security device or host software that filters communications, usually network traffic, based on a set of predefined rules? Sniffer Audito r Hacker Firewal l Authorization protects the confidentiality, integrity, and availability of personally identifiable or sensitive data. True False A replay attack occurs when a hacker uses a network sniffer to capture network traffic and then retransmits that traffic back on to the network at a later time. True False A firewall is a filtering device that enforces network security policy and protects the network against external attacks. True False The term bump-in-the-stack describes a term for a firewall that is implemented via software. True False Which term describes an object, computer, program, piece of data, or other logical or physical component you use in a business process to accomplish a business task? Asset Client Applian ce Trust The term monitoring refers to the act of creating or recording events into a log. True False A circuit is a logical connection between a client and a resource server. True False Which term is used to describe the process of encasing one protocol or packet inside another protocol or packet? Chokepoint Encapsulation Intrusion Detection System (IDS) Encryption Which name is given to the security service of preventing access to resources by unauthorized users while supporting access to authorized users? Confidentiality Authentication Demilitarized zone (dmz) Defense in Depth Integrity prevents unauthorized changes to data. True False A domain is a form of networking in which each computer is a peer. True False [Show More]
Last updated: 3 years ago
Preview 1 out of 7 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
University of the Cumberlands EMISS ISOL532 Telecommunications and network security. Chapter 1 and 2 Exam. 30 Q&A University of the Cumberlands EMISS ISOL532 Telecommunications and network security...
By Kirsch 3 years ago
$69
23
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 09, 2022
Number of pages
7
Written in
All
This document has been written for:
Uploaded
Aug 09, 2022
Downloads
0
Views
138
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·