BG_deck_4637598 Flashcards

1
Q

A proxy firewall typically uses what?P805

A

Two network interface cards(NICs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This type of firewall is referred to as a —- —– firewall?p805

A

Daul-homed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The proxy software manages the connections between the two —?P805

A

NICs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A —– —— firewall segregating two networks from each other are?P805

A

daul-homed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The proxy function can occur at either the —– —- or the —- —-?P805

A

application level.circuit level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is application level proxy?P805

A

It reads the function of the individual commands of the protocols that are being served.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

UDP is?P806

A

User data protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ICMP is?P806

A

Internet control message protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DOS is?P806

A

Denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DDoS is?P806

A

Distributed denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ICMP is?P806

A

broadcasting ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is antispyware?P806

A

It is software that seeks out and stops viruses from entering and spreading in your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ensure that the most secure form of ——— ——– is used and supported by both the client and the authentication servers?p806

A

Authentication encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Use encrypted — and —– whenever possible,even for internal communications?p806

A

software,protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Require users to change their —– according to the company’s password policy?P807

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Instruct users to never write their —— down.P807

A

password

17
Q

Tell users share their —– or —- session with another person?P807

A

password,logon

18
Q

Users should —- – any personal data onto verified removable media?P807

A

back up

19
Q

Require users to employ a ——- ——- screensaver?P807

A

password protected

20
Q

During the first release of STAR WARS two of the most popular passwords used on collage campuses were —— and—–P?807

A

C3PO, R2D2

21
Q

The most effective method of preventing viruses,spyware,and harm to data is ———?p808

A

EDUCATION

22
Q

What are two common security threats?P808

A

your social engineering and malware

23
Q

What is social engineering?P209

A

It is a process in witch an attacker attempts to acquire information about network and system by social means,such as talking to people in the organization.

24
Q

When a attempt is made to acquire access information such as passwords through email or instant messaging, this is known as ———-?P809

A

phishing.

25
Q

Y/N. Do you let users use the auto-logon features?P807

A

no