Вы находитесь на странице: 1из 4

Question 1 0 out of 0.

5 points Incorrect The popular use for tunnel mode VPNs is the end-to-end transport of encrypted da ta. Answer Selected Answer: True Correct Answer: False Question 2 0.5 out of 0.5 points Correct The Extended TACACS version uses dynamic passwords and incorporates two-factor a uthentication. Answer Selected Answer: False Correct Answer: False Question 3 0.5 out of 0.5 points Correct Kerberos ____ provides tickets to clients who request services. Answer Selected Answer: TGS Correct Answer: TGS Question 4 0.5 out of 0.5 points Correct The application gateway is also known as a(n) ____. Answer Selected Answer: application-level firewall Correct Answer: application-level firewall Question 5 0.5 out of 0.5 points Correct Internet connections via dial-up and leased lines are becoming more popular. Answer Selected Answer: False Correct Answer: False Question 6 0.5 out of 0.5 points Correct Access control is achieved by means of a combination of policies, programs, and technologies. Answer Selected Answer: True

Correct Answer: Question 7 0.5 out of 0.5 points

True

Correct The proxy server is often placed in an unsecured area of the network or is place d in the ____ zone. Answer Selected Answer: demilitarized Correct Answer: demilitarized Question 8 0.5 out of 0.5 points Correct ____ and TACACS are systems that authenticate the credentials of users who are t rying to access an organization s network via a dial-up connection. Answer Selected Answer: RADIUS Correct Answer: RADIUS Question 9 0.5 out of 0.5 points Correct A benefit of a(n) dual-homed host is its ability to translate between many diffe rent protocols at their respective data link layers, including Ethernet, token r ing, Fiber Distributed Data Interface, and asynchronous transfer mode. Answer Selected Answer: True Correct Answer: True Question 10 0.5 out of 0.5 points Correct Firewalls can be categorized by processing mode, development era, or structure. Answer Selected Answer: True Correct Answer: True Question 11 0.5 out of 0.5 points Correct Firewalls fall into ____ major processing-mode categories. Answer Selected Answer: five Correct Answer: five Question 12 0.5 out of 0.5 points

Correct The restrictions most commonly implemented in packet-filtering firewalls are bas ed on ____. Answer Selected Answer: All of the above Correct Answer: All of the above Question 13 0.5 out of 0.5 points Correct The outside world is known as the trusted network (e.g., the Internet). Answer Selected Answer: False Correct Answer: False Question 14 0.5 out of 0.5 points Correct Circuit gateway firewalls prevent direct connections between one network and ano ther. Answer Selected Answer: True Correct Answer: True Question 15 0.5 out of 0.5 points Correct SOHO assigns non-routing local addresses to the computer systems in the local ar ea network and uses the single ISP-assigned address to communicate with the Inte rnet. Answer Selected Answer: False Correct Answer: False Question 16 0.5 out of 0.5 points Correct A content filter is essentially a set of scripts or programs that restricts user access to certain networking protocols and Internet locations. Answer Selected Answer: True Correct Answer: True Question 17 0.5 out of 0.5 points Correct There are limits to the level of configurability and protection that software fi rewalls can provide. Answer Selected Answer: True Correct Answer: True Question 18

0 out of 0.5 points Incorrect ____ filtering requires that the filtering rules governing how the firewall deci des which packets are allowed and which are denied be developed and installed wi th the firewall. Answer Selected Answer: Stateful Correct Answer: Static Question 19 0.5 out of 0.5 points Correct A packet s structure is independent from the nature of the packet. Answer Selected Answer: False Correct Answer: False Question 20 0 out of 0.5 points Incorrect ____ generates and issues session keys in Kerberos. Answer Selected Answer: TGS Correct Answer: KDC

Вам также может понравиться