Telecommunication and Information Technology > QUESTIONS & ANSWERS > University of the Cumberlands EMISS ISOL532 Telecommunications and network security. Chapter 7 & 8 Q (All)
QUESTION 1 1. Which of the following describes fair queuing? A technique of load balancing that operates by sending the next transaction to the firewall with the least current workload. An event t ... hat triggers an alarm but should not have because the traffic or event actually is benign. A form of IDS/IPS detection based on a collection of samples, patterns, signatures, and so on. A written expression of an item of concern (protocol, port, service, application, user, and IP address) and one or more actions to take when the item of concern appears in traffic. 5.00000 points QUESTION 2 1. A false negative is an event that triggers an alarm when the traffic or event is abnormal and/or malicious. True False 5.00000 points QUESTION 3 1. Which of the following is given to a notification from a firewall that a specific event or packet was detected? Management interface Behavioral-based detection Alert Anomaly-based Detection 5.00000 points QUESTION 4 1. Which of the following refers to the deployment of a firewall as an allencompassing primary gateway security solution? Unified threat management (UTM) Access control list (ACL) Signature-based detection False positive 5.00000 points QUESTION 5 1. Which of the following provides faster access to static content for external users accessing internal Web servers? General purpose OS Security stance Reverse caching Diversity of defense 5.00000 points QUESTION 6 1. What is anomaly-based detection? An event that does not trigger an alarm but should have because the traffic or event is abnormal and/or malicious. An event that triggers an alarm but should not have because the traffic or event is benign. A notification from a firewall that a specific event or packet was detected. A form of intrusion detection system/intrusion prevention system (IDS/ IPS) based on a defined normal, often defined using rules similar to firewall rules. 5.00000 points QUESTION 7 1. Adding caching to a firewall transforms it into a proxy server for whatever service you configure the caching to supplement. True False 5.00000 points QUESTION 8 1. Rule-set ordering is critical to the successful operation of firewall security. True False 5.00000 points QUESTION 9 1. Which term describes a security stance that prevents all communications except those enabled by specific allow exceptions? Syslog Deny by default/Allow by exception Behavioral-based detection Signature-based detection 5.00000 points QUESTION 10 1. Which of the following describes write-once read-many (WORM)? A mechanism defining traffic or an event to apply an authorization control of allow or deny against A storage device that can be written to once, but once written cannot be electronically altered A form of network access control or admission control (NAC) used on individual network access devices, such as firewalls, VPN gateways, and wireless routers A form of IDS/IPS detection based on a recording of real-world traffic as a baseline for normal 5.00000 points QUESTION 11 1. Denial of service (DoS) attacks cannot be detected by a firewall. True False 5.00000 points QUESTION 12 1. Which of the following describes security stance? An organization’s filtering configuration; it answers the question, “What should be allowed and what should be blocked?” A means of providing faster access to static content for external users accessing internal Web servers An operating system such as Windows or Linux that supports a wide variety of purposes and functions, but when used as a bastion host OS must be hardened and locked down An approach to security similar to defense in depth that uses a different security mechanism at each or most of the layers 5.00000 points QUESTION 13 1. A firewall can perform only the operations for which it is programmed, and the specifics of and the order of the rules that result in less access rather than greater access are: List specific Deny rules first, then the Allow exceptions, and always keep the default-deny rule last. True False 5.00000 points QUESTION 14 1. Which of the following can improve firewall performance? Firewalking Load balancing Port-Based Network Access (Admission) Control (PNAC) Wirespeed 5.00000 points QUESTION 15 1. Deploy firewalls as quickly as possible. True False 5.00000 points QUESTION 16 1. Which of the following refers to a network access control or admission control (NAC) used on individual network access devices, such as firewalls, VPN gateways, and wireless routers, to offload authentication to a dedicated authentication server/service? Port-based network access (admission) control (PNAC) Database-based detection Management interface Access control list (ACL) 5.00000 points QUESTION 17 1. Which command-line or graphical interface is used to control and configure a device? Port-based network access (Admission) control (PNAC) Fair queuing Management interface Signature 5.00000 points QUESTION 18 1. Your security strategy should never support encrypted communications across your network. True False 5.00000 points QUESTION 19 1. The term weakest link describes an organization’s filtering configuration; it's the answer to the question, “What should be allowed and what should be blocked?” True False 5.00000 points QUESTION 20 1. Which of the following hands out tasks in a repeating non-priority sequence? Port-based network access (admission) control (PNAC) Firewalking Round robin Alert [Show More]
Last updated: 3 years ago
Preview 1 out of 5 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
University of the Cumberlands EMISS ISOL532 Telecommunications and network security. Chapter 1 and 2 Exam. 30 Q&A University of the Cumberlands EMISS ISOL532 Telecommunications and network security...
By Kirsch 3 years ago
$69
23
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 09, 2022
Number of pages
5
Written in
All
This document has been written for:
Uploaded
Aug 09, 2022
Downloads
0
Views
103
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·