ANSWERS (GRADED A+)
False - ANSWER-A domain is a form of networking in which each computer is a peer
False - ANSWER-A WAN domain refers to the authorized and authenticated remote
access procedures for users to remotely access the organization's IT infrastructure,
systems, and data
False - ANSWER-The term monitoring refers to the act of creating or recording
events into a log
True - ANSWER-A replay attack occurs when a hacker uses a network sniffer to
capture network traffic and then transmits the traffic back at later time
True - ANSWER-Tunneling is the act of transmitting a protocol across an
intermediary network by encapsulating it in another protocol
False - ANSWER-A blacklist is a type of filtering where the network denies all
activities except for those on the list
True - ANSWER-Authentication confirms the identity of the user
True - ANSWER-Caching is the retention of internet content by a proxy server
False - ANSWER-Encryption is the process or mechanism that grants or denies use
of a resource
True - ANSWER-IDS is a security mechanism that detects unauthorized user
activities, attacks, and network compromises
True - ANSWER-A chokepoint is a form of bottleneck and is a single, controlled
pathway between two different levels of network trust where a firewall or other
filtering devices block or allow traffic based on a set of rules
False - ANSWER-Remote Access Server (RAS) is a network server that accepts
outbound connections from remote clients
False - ANSWER-Authorization protects the C.I.A. of PII or sensitive data
True - ANSWER-The term thin client computing refers to a legacy terminal concept
used to control mainframes
False - ANSWER-A node is a network device responsible for directing traffic towards
its stated destination along the best known current avaialble path
, True - ANSWER-Integrity prevents unauthorized changes to data
True - ANSWER-The term Annualized Rate of Occurrence (ARO) refers to the
probability prediction based on statistics and historical occurrences on the likelihood
of how many times in the next year a threat will be a realized attack
False - ANSWER-Data Link Layer (Layer 2) is the OSi model layer responsible for
logical addressing (MAC Addresses) and supporting network topology, such as
ethernet
False - ANSWER-A software firewall can protect a single host or a network of hosts,
whereas a hardware firewall can only protect a single host
True - ANSWER-Ingress filtering filters traffic as it attempts to enter a network,
including spoofed addresses, malformed packets, unauthorized ports and protocols,
and blocked destinations
False - ANSWER-An application firewall filters on a specific application's content and
session information; however, it cannot inspect traffic at any later
False - ANSWER-Dynamic packet filtering uses a static or fixed set of rules to filter
network traffic
True - ANSWER-The term bump-in-the-stack describes a term for a firewall that is
implemented via software
True - ANSWER-Content filtering is a form of filtering that focuses on traffic content
True - ANSWER-Cost/benefit analysis is the final equation of risk analysis to assess
the relative benefit of a counter-measure against the potential annual loss of a given
asset exposed to a specific threat
True - ANSWER-The term asset value (AV) describes the cumulative value of an
asset based on both tangible and intangible values. AV supports SLE calculation
True - ANSWER-A personal firewall is designed to provide protections to a single
system or small network
True - ANSWER-The term Bastion Host refers to a firewall positioned along the
pathway of a potential attack. It serves as the first line of defense
True - ANSWER-A circuit is a logical connection between a client and a resource
server
False - ANSWER-A dual-homed firewall describes a firewall that has 3 network
interfaces.
False - ANSWER-Dynamic packet filtering is the process of automatically creating
temporary filters. In most cases, the filters allow outbound responses to previous
inbound requests