Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN 266 Final Exam(latest)2022

Beoordeling
-
Verkocht
-
Pagina's
9
Cijfer
A+
Geüpload op
18-08-2022
Geschreven in
2022/2023

If a firewall receives a suspicious packet, the firewall will ________. -log the packet -drop the packet -Both log the packet and drop the packet -Neither log the packet nor drop the packet -Neither log the packet nor drop the packet In ________ filtering, the firewall filters packets when they are leaving the network. -ingress -egress -Both ingress and egress -Neither ingress nor egress -ingress 00:58 01:07 Most packets are part of the ________ state. -connection opening -connection closing -Both connection opening and connection closing -Neither connection opening nor connection closing -Neither connection opening nor connection closing Static packet filtering is sometimes used ________. -as a secondary filtering mechanism on an application proxy firewall -on border routers -Both as a secondary filtering mechanism on an application proxy firewall and on border routers -Neither as a secondary filtering mechanism on an application proxy firewall nor on border routers -Both as a secondary filtering mechanism on an application proxy firewall and on border routers Firewalls will drop ________. -suspicious packets -provable attack packets -Both suspicious packets and provable attack packets -Neither suspicious packets nor provable attack packets -provable attack packets If a firewall cannot keep up with traffic volume, it will ________. -continue passing all packets but slow operation -drop packets it cannot process -pass any packets it cannot filter -shut down, failing safely -drop packets it cannot process SPI firewalls can conduct ________ inspection. -stateful packet -static packet filtering -Both stateful packet and static packet filtering -Neither stateful packet nor static packet filtering -Both stateful packet and static packet filtering A connection designates a specific program designated by a port number on a specific computer's IP address. - True -False -False An internal firewall sits at the boundary between the corporate site and the Internet. -True -False -False ________ firewalls filter traffic passing between different parts of a site's network. -Border -Internal -Intermediate -None of these -Internal A border firewall sits at the boundary between the corporate site and the external Internet. -True -False -True A ________ is a persistent conversation between different programs on different computers. -connection -state -Both connection and state -Neither connection nor state -connection A ________ firewall handling all traditional firewall functions (SPI, ACLs, etc.) as well as additional security functions such as antivirus filtering, spam filtering, application proxy filtering, and so forth. -unified threat management -stateful packet inspection -static packet inspection -None of these -unified threat management CLI shells use more system resources than GUIs. -True -False -False A company should not replace default passwords during configuration. -True -False -False Systems administrators generally do not manage the network -True -False -True A specific distribution of UNIX comes with multiple user interfaces. -True -False -True MMCs are administrative used to manage ________ servers. -Apple -Microsoft -UNIX -All of these -Microsoft Which of the following security protections are provided by recent version of Windows Server? -Server software firewalls -The ability to encrypt data -Both Server software firewalls and The ability to encrypt data -Neither Server software firewalls nor The ability to encrypt data -Both Server software firewalls and The ability to encrypt data Any device with an IP address is a ________. -server -host -client -None of these -host Which of the following are elements of host hardening? -Encrypting data on the host -Read operating system log files -Both Encrypting data on the host and Read operating system log files -Neither Encrypting data on the host nor Read operating system log files -Both Encrypting data on the host and Read operating system log files A LINUX distribution consists only of the LINUX kernel. -True -False -False If an attacker takes over a firewall, he or she will be able to ________. -allow connection-opening requests that violate policy -reroute internal data to alternate paths -provide the false sense that the firewall is still working correctly -All of these -All of these A ________ is an individual application on the tree pane of an MMC that can be added or dropped from the tree list easily. -snap-in -management application -administrative application -Action -snap-in Different UNIX versions have different security methods. -True -False -True When you use your mobile firm to surf the Internet, it is a host. -True -False -True ________ is a version of ________ for PCs. -LINUX, UNIX -UNIX, LINUX -Both LINUX, UNIX and UNIX, LINUX -Neither LINUX, UNIX nor UNIX, LINUX -LINUX, UNIX A systems administrator may manage ________. -an individual host -a group of hosts -Both an individual host and a group of hosts -Neither an individual host nor a group of hosts -Both an individual host and a group of hosts To prevent eavesdropping, applications should ________. -be updating regularly -use electronic signatures -use encryption for confidentiality -use encryption for authentication -use encryption for confidentiality In a SQL injection attack, attackers may use lookup commands to obtain unauthorized information. -True -False -True Overall for firms, which is more time consuming to patch? -Applications -Operating systems -Both are about equally time consuming to patch -None of these -Applications

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

ITN 266 Final Exam
If a firewall receives a suspicious packet, the firewall will ________.
-log the packet
-drop the packet
-Both log the packet and drop the packet
-Neither log the packet nor drop the packet - Answer -Neither log the packet nor drop
the packet

In ________ filtering, the firewall filters packets when they are leaving the network.
-ingress
-egress
-Both ingress and egress
-Neither ingress nor egress - Answer -ingress

Most packets are part of the ________ state.

-connection opening
-connection closing
-Both connection opening and connection closing
-Neither connection opening nor connection closing - Answer -Neither connection
opening nor connection closing

Static packet filtering is sometimes used ________.
-as a secondary filtering mechanism on an application proxy firewall
-on border routers
-Both as a secondary filtering mechanism on an application proxy firewall and on border
routers
-Neither as a secondary filtering mechanism on an application proxy firewall nor on
border routers - Answer -Both as a secondary filtering mechanism on an application
proxy firewall and on border routers

Firewalls will drop ________.
-suspicious packets
-provable attack packets
-Both suspicious packets and provable attack packets
-Neither suspicious packets nor provable attack packets - Answer -provable attack
packets

If a firewall cannot keep up with traffic volume, it will ________.
-continue passing all packets but slow operation
-drop packets it cannot process
-pass any packets it cannot filter
-shut down, failing safely - Answer -drop packets it cannot process

, SPI firewalls can conduct ________ inspection.
-stateful packet
-static packet filtering
-Both stateful packet and static packet filtering
-Neither stateful packet nor static packet filtering - Answer -Both stateful packet and
static packet filtering

A connection designates a specific program designated by a port number on a specific
computer's IP address.

- True
-False - Answer -False

An internal firewall sits at the boundary between the corporate site and the Internet.
-True
-False - Answer -False

________ firewalls filter traffic passing between different parts of a site's network.
-Border
-Internal
-Intermediate
-None of these - Answer -Internal

A border firewall sits at the boundary between the corporate site and the external
Internet.
-True
-False - Answer -True

A ________ is a persistent conversation between different programs on different
computers.
-connection
-state
-Both connection and state
-Neither connection nor state - Answer -connection

A ________ firewall handling all traditional firewall functions (SPI, ACLs, etc.) as well as
additional security functions such as antivirus filtering, spam filtering, application proxy
filtering, and so forth.
-unified threat management
-stateful packet inspection
-static packet inspection
-None of these - Answer -unified threat management

CLI shells use more system resources than GUIs.
-True
-False - Answer -False

Geschreven voor

Vak

Documentinformatie

Geüpload op
18 augustus 2022
Aantal pagina's
9
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$12.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EvaTee Phoenix University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5202
Lid sinds
4 jaar
Aantal volgers
3567
Documenten
55584
Laatst verkocht
12 uur geleden
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

947 beoordelingen

5
451
4
167
3
171
2
48
1
110

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen