Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

SEC 150 Quiz 11-12 Questions And Answers Updated 2022

Rating
-
Sold
-
Pages
33
Grade
A+
Uploaded on
21-10-2022
Written in
2022/2023

SEC 150 Quiz 11-12 Questions And Answers Updated 2022

Institution
Course

Content preview

 SEC 150 Quiz 11Question 1
0 out of 5 points
Which of the following is one of the most common and easily exploited
vulnerabilities on any hardware network device? Default password
Selected Undistributed authentication
Answer:
credentials
Answers: Insecure default configuration
Misconfiguration by the
installer
Undistributed authentication
credentials
Default password
 Question 2
5 out of 5 points
VPN hardware can suffer from an unsecured default configuration or
misconfiguration.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
 Question 3
5 out of 5 points
Determining who the target audience for training is takes place in the
planning stage.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
 Question 4
0 out of 5 points
The least common method for implementing a highly available VPN
involves buying two VPN hardware units and configuring them as a
highly available pair. False
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
 Question 5

, 5 out of 5 points
Anonymity is the capability for a network or system user to remain
unknown.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
 Question 6
5 out of 5 points
When employees have multiple concurrent connections, what might
be happening to the VPN system?
Selected There may be a security issue.
Answer:
Answers: There may be a software failure.
Employees may be trying to access the system from
remote locations.
There may be a security issue.
There may be a hardware failure.
 Question 7
5 out of 5 points
To mitigate the risk of security threats and breaches, all installers
should be trained before installing the VPN.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
 Question 8
5 out of 5 points
Which type of architecture recognizes that the VPN is vulnerable to attack if placed
directly in the Internet, and therefore places the Internet-facing VPN connection
behind a firewall?

Selected Internally connected
Answer: architecture
Answers: Two-factor architecture
Internally connected
architecture
Bypass architecture
DMZ architecture

, Question 9
5 out of 5 points
Which term describes a process by which malicious code can enter
from a non-secure network, and make a hairpin, or sharp turn, and
enter a secure network with little or no trouble because it is entering
from a secure and verified endpoint?
Selected Hairpinning
Answer:
Answers: Hairpinning
Anonymity
Slideware
Service Level Agreement
(SLA)
 Question 10
5 out of 5 points
“Privacy” is considered keeping information about a network or
system user from being disclosed to unauthorized people.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
 Question 11
0 out of 5 points
Which section of the VPN policy describes the systems, networks, or
people covered by the policy?Scope
Selected Policy
Answer:
Answers: Introducti
on
Policy
Scope
Purpose
 Question 12
0 out of 5 points
A VPN deployment plan does not need to take into consideration the
support of encryption protocols. False
Selected Tru
Answer: e
Answers: Tru

, e
Fals
e
 Question 13
5 out of 5 points
A VPN policy should address which authorization methods are
permitted on the system.
Selected Tru
Answer: e
Answers: Tru
e
Fals
e
 Question 14
5 out of 5 points
Anonymity is the capability of a network or system user to remain
known on the system.
Selected Fals
Answer: e
Answers: Tru
e
Fals
e
 Question 15
5 out of 5 points
Which type of architecture deploys the VPN so that traffic to and from
the VPN is not firewalled?
Selected Bypass architecture
Answer:
Answers: Internally connected
architecture
Bypass architecture
DMZ architecture
Two-factor architecture
 Question 16
0 out of 5 points
Internally connected implementation uses a firewall in front of the VPN
to protect it from Internet-based attacks and behind the firewall to
protect the internal network. False
Selected Tru
Answer: e
Answers: Tru
e
Fals

Written for

Course

Document information

Uploaded on
October 21, 2022
Number of pages
33
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$24.18
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ethanhope Chamberlain College Of Nursng
Follow You need to be logged in order to follow users or courses
Sold
99
Member since
5 year
Number of followers
97
Documents
2789
Last sold
11 months ago

4.4

20 reviews

5
15
4
2
3
0
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions