Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Security Pro Ch5 Questions and Answers 2023 with complete solution

Rating
-
Sold
-
Pages
12
Grade
A
Uploaded on
04-09-2023
Written in
2023/2024

Security Pro Ch5 Questions and Answers 2023 with complete solution Where should an organization's web server be placed? DMZ Which of the following is a privately controlled portion of a network that is accessible to some specific external entities? Extranet You want to create a collection of computers on your network that appear to have valuable data but actually store fake data that could entice a potential intruder. Once the intruder connects, you want to be able to observe and gather information about the attacker's methods. Which feature should you implement? Honeynet A honeypot is used for which purpose? To delay intruders in order to gather auditing data Which of the following devices can apply quality of service and traffic-shaping rules based on what created the network traffic? Application-aware devices You are the office manager of a small financial credit business. Your company handles personal financial information for clients seeking small loans over the internet. You are aware of your obligation to secure clients records, but the budget is an issue for your company. Which item would provide the BEST security for this situation? All-in-one security appliance You are implementing security at a local high school that is concerned with students accessing inappropriate material on the internet from the library's computers. The students use the computers to search the internet for research paper content. The school budget is limited. Which content filtering option would you choose? Restrict content based on content categories. Which of the following BEST describes a honeyfile? A single file setup to entice and trap attackers. Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the internet through airport and hotel networks. You are concerned that these computers could pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless antivirus software and the latest operating system patches are installed. Which solution should you use? NAC A proxy server can be configured to do which of the following? Restrict users on the inside of a network from getting out to the internet.

Show more Read less
Institution
Course

Content preview

Security Pro Ch5 Questions and Answers 2023 with
complete solution
Where should an organization's web server be placed?
DMZ
Which of the following is a privately controlled portion of a network that is
accessible to some specific external entities?
Extranet
You want to create a collection of computers on your network that appear to have
valuable data but actually store fake data that could entice a potential intruder.
Once the intruder connects, you want to be able to observe and gather
information about the attacker's methods.
Which feature should you implement?
Honeynet
A honeypot is used for which purpose?
To delay intruders in order to gather auditing data
Which of the following devices can apply quality of service and traffic-shaping
rules based on what created the network traffic?
Application-aware devices
You are the office manager of a small financial credit business. Your company
handles personal financial information for clients seeking small loans over the
internet. You are aware of your obligation to secure clients records, but the
budget is an issue for your company.
Which item would provide the BEST security for this situation?
All-in-one security appliance
You are implementing security at a local high school that is concerned with
students accessing inappropriate material on the internet from the library's
computers. The students use the computers to search the internet for research
paper content. The school budget is limited.
Which content filtering option would you choose?
Restrict content based on content categories.
Which of the following BEST describes a honeyfile?
A single file setup to entice and trap attackers.
Members of the sales team use laptops to connect to the company network. While
traveling, they connect their laptops to the internet through airport and hotel
networks.
You are concerned that these computers could pick up viruses that could spread
to your private network. You would like to implement a solution that prevents the
laptops from connecting to your network unless antivirus software and the latest
operating system patches are installed.
Which solution should you use?
NAC
A proxy server can be configured to do which of the following?
Restrict users on the inside of a network from getting out to the internet.

, Which of the following terms describes a network device that is exposed to
attacks and has been hardened against those attacks?
Bastion or sacrificial host
Of the following security zones, which one can serve as a buffer network between
a private secured network and the untrusted internet?
DMZ
Which of the following is the MOST likely to happen if the firewall managing
traffic into the DMZ fails?
Only the servers in the DMZ are compromised, but the LAN will stay protected.
You have a company network that is connected to the internet. You want all users
to have internet access, but you need to protect your private network and users.
You also need to make a web server publicly available to internet users.
Which solution should you use?
Use firewalls to create a DMZ. Place the web server inside the DMZ and the private
network behind the DMZ.
How many network interfaces does a dual-homed gateway typically have?
3
What needs to be configured on a firewall to allow traffic directed to the public
resource in the DMZ?
Packet filters
You have used firewalls to create a demilitarized zone. You have a web server
that needs to be accessible to internet users. The web server must communicate
with a database server for retrieving product, customer, and order information.
How should you place devices on the network to best protect the servers? (Select
two.)
Put the database server on the private network.
Put the web server inside the DMZ.
In which of the following situations would you most likely implement a
demilitarized zone (DMZ)?
You want to protect a public web server from attack.
Which of the following is another name for a firewall that performs router
functions?
Screening router
Which of the following is the BEST solution to allow access to private resources
from the internet?
VPN
Which of the following describes how access control lists can be used to improve
network security?
An access control list filters traffic based on the IP header information, such as source
or destination IP address, protocol, or socket number.
Which of the following are features of an application-level gateway? (Select two.)
Stops each packet at the firewall for inspection
Reassembles entire messages
You want to install a firewall that can reject packets that are not part of an active
session. Which type of firewall should you use?
Circuit-level gateway

Written for

Course

Document information

Uploaded on
September 4, 2023
Number of pages
12
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
katoinyambi96 stuvia
Follow You need to be logged in order to follow users or courses
Sold
49
Member since
2 year
Number of followers
31
Documents
1267
Last sold
4 months ago

4.5

6 reviews

5
4
4
1
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions