SEC 150 Quiz 11Question 1
0 out of 5 points
Which of the following is one of the most common and easily exploited
vulnerabilities on any hardware network device? Default password
Selected Undistributed authentication
Answer:
credentials
Answers: Insecure default configuration
Misconfiguration by the
installer
Undistributed authentication
credentials
Default password
Question 2
5 out of 5 points
VPN hardware can suffer from an unsecured default configuration or
misconfiguration.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
Question 3
5 out of 5 points
Determining who the target audience for training is takes place in the
planning stage.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
Question 4
0 out of 5 points
The least common method for implementing a highly available VPN
involves buying two VPN hardware units and configuring them as a
highly available pair. False
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
Question 5
, 5 out of 5 points
Anonymity is the capability for a network or system user to remain
unknown.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
Question 6
5 out of 5 points
When employees have multiple concurrent connections, what might
be happening to the VPN system?
Selected There may be a security issue.
Answer:
Answers: There may be a software failure.
Employees may be trying to access the system from
remote locations.
There may be a security issue.
There may be a hardware failure.
Question 7
5 out of 5 points
To mitigate the risk of security threats and breaches, all installers
should be trained before installing the VPN.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
Question 8
5 out of 5 points
Which type of architecture recognizes that the VPN is vulnerable to attack if placed
directly in the Internet, and therefore places the Internet-facing VPN connection
behind a firewall?
Selected Internally connected
Answer: architecture
Answers: Two-factor architecture
Internally connected
architecture
Bypass architecture
DMZ architecture
, Question 9
5 out of 5 points
Which term describes a process by which malicious code can enter
from a non-secure network, and make a hairpin, or sharp turn, and
enter a secure network with little or no trouble because it is entering
from a secure and verified endpoint?
Selected Hairpinning
Answer:
Answers: Hairpinning
Anonymity
Slideware
Service Level Agreement
(SLA)
Question 10
5 out of 5 points
“Privacy” is considered keeping information about a network or
system user from being disclosed to unauthorized people.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
Question 11
0 out of 5 points
Which section of the VPN policy describes the systems, networks, or
people covered by the policy?Scope
Selected Policy
Answer:
Answers: Introducti
on
Policy
Scope
Purpose
Question 12
0 out of 5 points
A VPN deployment plan does not need to take into consideration the
support of encryption protocols. False
Selected Tru
Answer: e
Answers: Tru
, e
Fals
e
Question 13
5 out of 5 points
A VPN policy should address which authorization methods are
permitted on the system.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
Question 14
5 out of 5 points
Anonymity is the capability of a network or system user to remain
known on the system.
Selected Fals
Answer: e
Answers: Tru
e
Fals
e
Question 15
5 out of 5 points
Which type of architecture deploys the VPN so that traffic to and from
the VPN is not firewalled?
Selected Bypass architecture
Answer:
Answers: Internally connected
architecture
Bypass architecture
DMZ architecture
Two-factor architecture
Question 16
0 out of 5 points
Internally connected implementation uses a firewall in front of the VPN
to protect it from Internet-based attacks and behind the firewall to
protect the internal network. False
Selected Tru
Answer: e
Answers: Tru
e
Fals
0 out of 5 points
Which of the following is one of the most common and easily exploited
vulnerabilities on any hardware network device? Default password
Selected Undistributed authentication
Answer:
credentials
Answers: Insecure default configuration
Misconfiguration by the
installer
Undistributed authentication
credentials
Default password
Question 2
5 out of 5 points
VPN hardware can suffer from an unsecured default configuration or
misconfiguration.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
Question 3
5 out of 5 points
Determining who the target audience for training is takes place in the
planning stage.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
Question 4
0 out of 5 points
The least common method for implementing a highly available VPN
involves buying two VPN hardware units and configuring them as a
highly available pair. False
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
Question 5
, 5 out of 5 points
Anonymity is the capability for a network or system user to remain
unknown.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
Question 6
5 out of 5 points
When employees have multiple concurrent connections, what might
be happening to the VPN system?
Selected There may be a security issue.
Answer:
Answers: There may be a software failure.
Employees may be trying to access the system from
remote locations.
There may be a security issue.
There may be a hardware failure.
Question 7
5 out of 5 points
To mitigate the risk of security threats and breaches, all installers
should be trained before installing the VPN.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
Question 8
5 out of 5 points
Which type of architecture recognizes that the VPN is vulnerable to attack if placed
directly in the Internet, and therefore places the Internet-facing VPN connection
behind a firewall?
Selected Internally connected
Answer: architecture
Answers: Two-factor architecture
Internally connected
architecture
Bypass architecture
DMZ architecture
, Question 9
5 out of 5 points
Which term describes a process by which malicious code can enter
from a non-secure network, and make a hairpin, or sharp turn, and
enter a secure network with little or no trouble because it is entering
from a secure and verified endpoint?
Selected Hairpinning
Answer:
Answers: Hairpinning
Anonymity
Slideware
Service Level Agreement
(SLA)
Question 10
5 out of 5 points
“Privacy” is considered keeping information about a network or
system user from being disclosed to unauthorized people.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
Question 11
0 out of 5 points
Which section of the VPN policy describes the systems, networks, or
people covered by the policy?Scope
Selected Policy
Answer:
Answers: Introducti
on
Policy
Scope
Purpose
Question 12
0 out of 5 points
A VPN deployment plan does not need to take into consideration the
support of encryption protocols. False
Selected Tru
Answer: e
Answers: Tru
, e
Fals
e
Question 13
5 out of 5 points
A VPN policy should address which authorization methods are
permitted on the system.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
Question 14
5 out of 5 points
Anonymity is the capability of a network or system user to remain
known on the system.
Selected Fals
Answer: e
Answers: Tru
e
Fals
e
Question 15
5 out of 5 points
Which type of architecture deploys the VPN so that traffic to and from
the VPN is not firewalled?
Selected Bypass architecture
Answer:
Answers: Internally connected
architecture
Bypass architecture
DMZ architecture
Two-factor architecture
Question 16
0 out of 5 points
Internally connected implementation uses a firewall in front of the VPN
to protect it from Internet-based attacks and behind the firewall to
protect the internal network. False
Selected Tru
Answer: e
Answers: Tru
e
Fals