Which term best describes this device?
You have been assigned to configure a DMZ that uses multiple firewall components. Specifically, you must configure a router that will authoritatively monitor and, if necessary, block traffic. This device will be the last one that inspects traffic before it passes to the internal network. Which term best describes this...
In relation to security, which of the following is the primary benefit of classifying systems?
In relation to security, which of the following is the primary benefit of classifying systems?A . Ability to identify common attacksB . Identification of highest-priority systems to protectC . Ability to recover quickly from a natural or man-made disasterD . Collection of information for properly configuring the firewallView AnswerAnswer: B
Which term describes a dedicated system meant only to house firewall software?
Which term describes a dedicated system meant only to house firewall software?A . Firewall applianceB . Virtual Private Network (VPN)C . Kernel firewallD . Proxy serverView AnswerAnswer: A
What is the term for a self-replicating program or algorithm that consumes system resources?
What is the term for a self-replicating program or algorithm that consumes system resources?A . Illicit serverB . Root kitC . TrojanD . WormView AnswerAnswer: D
Which of the following details should be included in documentation of an attack?
Which of the following details should be included in documentation of an attack?A . An overview of the security policy and suggestions for the next response planB . Estimates of how much the attack cost the company, and a list of the applications used by the attackerC . The time...
At what layer of the OSI/RM does a packet filter operate?
At what layer of the OSI/RM does a packet filter operate?A . Layer 1B . Layer 3C . Layer 5D . Layer 7View AnswerAnswer: B
What is the most common attack method against TCP?
What is the most common attack method against TCP?A . Illicit serverB . TrojanC . IP address spoofingD . SYN flood attackView AnswerAnswer: D
Which of the following best describes the protocol used, along with its primary benefit?
Consider the following image of a packet capture: Which of the following best describes the protocol used, along with its primary benefit?A . It is a passive FTP session, which is easier for firewalls to process.B . It is an active FTP session, which is necessary in order to support...
What is the primary strength of symmetric-key encryption?
What is the primary strength of symmetric-key encryption?A . It allows easy and secure exchange of the secret key.B . It creates a ash?of a text, enabling data integrity.It creates a ?ash?of a text, enabling data integrity.C . It can encrypt large amounts of data very quickly.D . It provides...
Which type of attack is occurring?
Consider the following diagram: Which type of attack is occurring?A . Polymorphic virus-based attackB . Denial-of-service attackC . Distributed denial-of-service attackD . Man-in-the-middle attack using a packet snifferView AnswerAnswer: C