Filters
Question type

Study Flashcards

A critical ____________________ is defined as a software- or hardware-related item that is indispensable to the operation of a device or program.

Correct Answer

verifed

verified

What is an intrusion detection and prevention system?

Correct Answer

verifed

verified

An intrusion detection and prevention sy...

View Answer

If a proxy server is in service, ____ should be disabled on routers and other devices that lie between the networks.


A) PAT
B) NAT
C) DNS
D) IP forwarding

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Many companies use the Internet to enable a(n) ____________________ that connects internal hosts with specific clients in other organizations.

Correct Answer

verifed

verified

virtual pr...

View Answer

____ of frequently accessed resources, such as Web page text and image files, can dramatically speed up the performance of your network because it reduces the load on your Web servers.


A) Hashing
B) Caching
C) Redundancy
D) Load balancing

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Match each item with a statement below. -Primary intent is to let all traffic through and then block specific types of traffic.


A) boot-up password
B) firewall rules
C) bastion host
D) screen saver password
E) restrictive
F) IP forwarding
G) permissive
H) supervisor password
I) caching

J) E) and H)
K) C) and I)

Correct Answer

verifed

verified

What is IP forwarding?

Correct Answer

verifed

verified

IP forwarding enables a packet to get fr...

View Answer

Any firewall hardware can support a proxy server.

A) True
B) False

Correct Answer

verifed

verified

A firewall must be ____ so its performance can grow along with the network it protects.


A) productive
B) extensible
C) scalable
D) robust

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

The cornerstone of most firewalls is the ____, a set of instructions based on organizational policy, configured by the administrator.


A) rule set
B) IP forwarding set
C) packet filter
D) DNS

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

What are the GAISP nine Pervasive Principles?

Correct Answer

verifed

verified

Accountability-Define and acknowledge ac...

View Answer

How should a firewall administrator guard against new risks?

Correct Answer

verifed

verified

A firewall needs regular care and attent...

View Answer

In 2003, GASSP was succeeded by ____.


A) GAAP
B) CISSP
C) GAISP
D) GASSPv2

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Describe the importance of the bastion host's performance.

Correct Answer

verifed

verified

The bastion host, although it may not be...

View Answer

Match each item with a statement below. -Tell the firewall what types of traffic to let in and out of your network.


A) boot-up password
B) firewall rules
C) bastion host
D) screen saver password
E) restrictive
F) IP forwarding
G) permissive
H) supervisor password
I) caching

J) A) and G)
K) All of the above

Correct Answer

verifed

verified

Computer systems have failed when critical computers were placed on the top floor of buildings that were poorly air conditioned.

A) True
B) False

Correct Answer

verifed

verified

Match each item with a statement below. -Set of rules that blocks all access by default, and then permits only specific types of traffic to pass through.


A) boot-up password
B) firewall rules
C) bastion host
D) screen saver password
E) restrictive
F) IP forwarding
G) permissive
H) supervisor password
I) caching

J) E) and H)
K) A) and G)

Correct Answer

verifed

verified

A(n) ____ approach allows all packets to pass through except those specified to be blocked.


A) Allow-All
B) Allow-Some
C) Port 80
D) Except Video

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Match each item with a statement below. -Must be entered to complete the process of starting up a computer.


A) boot-up password
B) firewall rules
C) bastion host
D) screen saver password
E) restrictive
F) IP forwarding
G) permissive
H) supervisor password
I) caching

J) A) and H)
K) F) and I)

Correct Answer

verifed

verified

The even distribution of traffic among two or more load-sharing firewalls can be achieved through the use of ____________________ switches, which are network devices with the intelligence to make routing decisions based on source and destination IP address or port numbers as specified in Layer 4 of the OSI reference model.

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer