Sunteți pe pagina 1din 3

10/12/2015

TheAceStudent:SaintCOm530quiz3module8(PerfectAnswer)

SaintCOm530quiz3module8(PerfectAnswer)
SaintCOm530quiz3module8(PerfectAnswer)
Question1.1.Whatshouldacompanyconsiderinstallingonthenetworkperimetertopreventdirect
connectionsbetweentheinternalnetworkandtheInternettohelpprotectitsdatawarehousesand
employeeprivacy?
(Points:4)
Router
VPNserver
ICMPmonitor
Proxyserver
Question2.2.TheCiscoPIXlineofproductsisbestdescribedaswhichofthefollowing?(Points:4)
softwarefirewall
PCwithfirewallinstalled
firewallappliance
VPNgateway
Question3.3.Whichofthefollowingisatypicaldrawbackofafreefirewallprogram?(Points:4)
cannotmonitortrafficinrealtime
oversimplifiedconfiguration
havecentralizedmanagement
moreexpensivethanhardwarefirewalls
Question4.4.Whichofthefollowingisanadvantageofhardwarefirewalls?(Points:4)
notscalablecomparedtosoftwarefirewalls
notdependentonaconventionalOS
lessexpensivethansoftwarefirewalls
easytopatch
Question5.5.WhatarethetwostandardportsusedbyFTPalongwiththeirfunction?(Points:4)
UDP23control,TCP20data
UDP20data,TCP21control
TCP21control,TCP20data
TCP23data,TCP21control
Question6.6.WhichofthefollowingistrueaboutprivateIPaddresses?(Points:4)
theyareassignedbytheIANA
theyarenotroutableontheInternet
theyaretargetedbyattackers
NATwasdesignedtoconservethem
Question7.7.WhichtypeofsecuritydevicecanspeedupWebpageretrievalandshieldhostson
theinternalnetwork?(Points:4)
cachingfirewall
proxyserver
cachingonlyDNSserver
DMZintermediary
Question8.8.Whichofthefollowingistrueaboutadualhomedhost?(Points:4)
servesasasinglepointofentrytothenetwork
itsmainobjectiveistostopwormsandviruses
usesasingleNICtomanagetwonetworkconnections
itisusedasaremoteaccessserverinsomeconfigurations
data:text/htmlcharset=utf8,%3Ch3%20class%3D%22posttitle%20entrytitle%22%20itemprop%3D%22name%22%20style%3D%22margin%3A%200px%3B

1/3

10/12/2015

TheAceStudent:SaintCOm530quiz3module8(PerfectAnswer)

Question9.9.Whichtypeoftranslationshouldyouuseifyouneed50computersinthecorporate
networktobeabletoaccesstheInternetusingasinglepublicIPaddress?(Points:4)
onetooneNAT
portaddresstranslation
onetomanyNAT
DMZproxytranslation
Question10.10.Whichofthefollowingisadisadvantageofusingaproxyserver?(Points:4)
shieldsinternalhostIPaddresses
slowsWebpageaccess
mayrequireclientconfiguration
cantfilterbasedonpacketcontent
Question11.11.WhichofthefollowingisatypeofVPNconnection?(Points:4)
sitetoserver
clienttosite
servertoclient
remotegateway
Question12.12.WhichofthefollowingisNOTafactorasecureVPNdesignshouldaddress?
(Points:4)
Encryption
Authentication
Nonrepudiation
performance
Question13.13.WhichIPseccomponentauthenticatesTCP/IPpacketstoensuredataintegrity?
(Points:4)
AH
ESP
IKE
ISAKMP
Question14.14.WhichofthefollowingisNOTanessentialelementofaVPN?(Points:4)
VPNserver
Tunnel
VPNclient
authenticationserver
Question15.15.WhichofthefollowingisNOTtrueaboutahardwareVPN?(Points:4)
shouldbethefirstchoiceforfastgrowingnetworks
canhandlemoretrafficthansoftwareVPNs
havemoresecurityvulnerabilitiesthansoftwareVPNs
createagatewaytogatewayVPN
Question16.16.WhichofthefollowingistrueabouttheInternet?(Points:4)
itisthesameastheWorldWideWeb
itwasestablishedinthemid1960s
itwasdevelopedbyanetworkofbanksandbusinesses
itwasoriginallybuiltonanextendedstartopology
Question17.17.Whichofthefollowingisahighlysecurepublicfacilityinwhichbackboneshave
interconnecteddatalinesandroutersthatexchangeroutingandtrafficdata?(Points:4)
ISP
POP
NAP
NSF
data:text/htmlcharset=utf8,%3Ch3%20class%3D%22posttitle%20entrytitle%22%20itemprop%3D%22name%22%20style%3D%22margin%3A%200px%3B

2/3

10/12/2015

TheAceStudent:SaintCOm530quiz3module8(PerfectAnswer)

Question18.18.WhatmakesIPspoofingpossibleforcomputersontheInternet?(Points:4)
networkaddresstranslation
thelackofauthentication
the32bitaddressspace
theDNShierarchy
Question19.19.Whattypeofattackdisplaysfalseinformationmasqueradingaslegitimatedata?
(Points:4)
Javaapplet
Phishing
Bufferoverflow
SQLinjection
Question20.20.WhichofthefollowingbestdescribesROI?(Points:4)
thechancethatathreatwillresultinlostmoney
howlongbeforeaninvestmentwillpayforitself
thecostofmitigatingathreat
thebenefitsofsettingsecuritypriorities
Question21.21.Whatisconsideredthefirststepinformulatingasecuritypolicy?(Points:4)
riskanalysis
eliminationofthreats
riskreduction
systemmonitoring
Question22.22.WhichofthefollowingbestdescribesaMonteCarlosimulation?(Points:4)
atechniqueforsimulatinganattackonasystem
aformulathatestimatesthecostofcountermeasures
aproceduralsystemthatsimulatesacatastrophe
ananalyticalmethodthatsimulatesareallifesystemforriskanalysis
Question23.23.Whichofthefollowingisasecurityrelatedreasonformonitoringandevaluating
networktraffic?(Points:4)
todetermineifyourIDPSsignaturesareworkingwell
tocreatesubstantialdatatoanalyze
tooptimizeyourrouterandswitchprotocols
toseehowmanyfilesemployeesdownloadformtheInternet
Question24.24.WhichofthefollowingisNOTtypicallyanaspectofasecurityeventmanagement
program?(Points:4)
monitoringevents
managingIDPSfirmware
managingdatafromsensors
managingchange
Question25.25.Whatshouldanoutsideauditingfirmbeaskedtosignbeforeconductingasecurity
audit?(Points:4)
subpoena
nondisclosureagreement
searchandseizurecontract
socialengineeringcovenant

SaintCOm530quiz3module8(PerfectAnswer)

data:text/htmlcharset=utf8,%3Ch3%20class%3D%22posttitle%20entrytitle%22%20itemprop%3D%22name%22%20style%3D%22margin%3A%200px%3B

3/3