IS3220 CHAPTER 1 Flashcards

1
Q

The process or mechanism of granting or denying use of a resource; typically applied to users or generic network traffic is called ___?

A

ACCESS CONTROL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A hardware product that is dedicated to a single primary function. The operating system or firmware of the hardware device is hardened and its use is limited to directly and only supporting the intended function. Firewalls, routers, and switches are typical ___?

A

APPLIANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anything you use in a business process to accomplish a business task is considered an ___?

A

ASSET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This can be the action of a system that is recording user activity and system events into a log. It can also be the action of one who checks for compliance with security policies and other regulations and is called the act of ___?

A

AUDITING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Either an outside consultant or an internal member of the Information Technology staff. They perform security audits, confirms that the checking is sufficient, and investigates trails produced by system checks. In the case of regulatory compliance, they should be external and independent of the organization. This person/position is called ___?

A

AUDITOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of confirming the identity of a user. It is also know as logon and is called ___?

A

AUTHENTICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Defining what users are allowed and not allowed to do. This is also known as access control and is called ___?

A

AUTHORIZATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a system is usable for its intended purpose. The security service that supports access to resources in a timely manner. If availability becomes compromised, a denial of service is taking place and is called ___?

A

AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is any access method or pathway that circumvents access or authentication mechanisms or unauthorized access to a system is called ___?

A

BACKDOOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of filtering in which all activities or entities are permitted except for those on a ___?

A

BLACK LIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Any restriction on the performance of a system. Can be caused by a slower component or pathway with insufficient throughput. It causes other components of system to work slower than their optimum rate and is called ___?

A

BOTTLENECK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Any compromise of security. Any violation of a restriction or rule whether caused by an authorized user or an unauthorized outsider is called ___?

A

BREACH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network device that forwards traffic between networks based on the MAC address of the Ethernet frame. It forwards only packets whose destination address is on the opposing network and is called ___?

A

BRIDGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Any activity necessary to meet an organization’s long-term goals. These are assigned to employees and other authorized personnel via their job description and is called ___?

A

BUSINESS TASK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Specifically, this is a proxy server and is the retention of Internet content. Various internal clients may access this content and provide it to subsequent requesters without the need to retrieve the same content from the Internet repeatedly and is called ___?

A

CACHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Similar to a bottleneck, but deliberately created within a network infrastructure. It is a controlled pathway through which all traffic must cross. At this point, filtering to block unwanted communication or monitoring can occur and is called ___?

A

CHOKE POINT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This is a host on a network. It is the computer system, which supports user interaction with the network. Users employ this to access resources from the network. Users can also employ this generically as any hardware or software product to access a resource. This is called a ___?

A

CLIENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A form of network where certain computers are designated as “servers” to host resources shared with the network. The remaining computers are designated as this to enable users to access shared resources. Most ___ employ directory services and single sign-on.

A

CLIENT/SERVER NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The security service of preventing access to resources by unauthorized users, while supporting access to authorized users is called ___?

A

CONFIDENTIALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A tactic of protection involving multiple layers or levels of security components. Based on the idea that multiple protections create a cumulative effect that will require an attacker to breach all layers, not just one is called ___?

A

DEFENSE IN DEPTH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A type of perimeter network used to host resources designated as accessible by the public from the Internet is called ___?

A

DEMILITARIZED ZONE (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A form of attack that attempts to compromise availability. These attacks are usually of two types: flaw exploitation and flooding and is called ___?

A

DENIAL OF SERVICE (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A network service that maintains a searchable index or database of network hosts and shared resources. Often based on a domain name system and an essential service of large networks is called ___?

A

DIRECTORY SERVICES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A client/server network managed by a directory service is called ___?

A

DOMAIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A network service that resolves FQDNs into their corresponding IP address. This is an essential service of most networks and their directory services and is called ___?

A

DOMAIN NAME SYSTEM (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Any planned or unplanned period when a network service or resource is not available. This can be caused by attack, hardware failure, or scheduled maintenance. Most organizations strive to minimize this through security and system management is called ___?

A

DOWNTIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Filtering traffic as it attempts to leave a network, which can include monitoring for spoofed addresses, malformed packets, unauthorized ports and protocols, and blocked destinations is called ___?

A

EGRESS FILTERING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The process of enclosing or encasing one protocol or packet inside another protocol or packet. Also know as “tunneling.” This allows for communications to cross intermediary networks that might be incompatible with the original protocol and is called ___?

A

ENCAPSULATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The process of converting original data into a chaotic and unusable form to protect it from unauthorized third parties is called __?

A

ENCRYPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An attack tool, method or technique a hacker uses to take advantage of a known vulnerability or flaw in a target system is called ___?

A

EXPLOIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A type of perimeter network used to host resources designated as accessible to a limited group of external entities, such as business partners or suppliers, but not by the public. Often, access to this requires the use of a virtual private network or VPN, especially when access originates from the Internet and is called ___?

A

EXTRANET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The process of inspecting content against a set of rules or restrictions to enforce allow-and-deny operations on that content. Firewalls and other security components use filtering is called ___?

A

FILTERING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A network security device or host software that filters communications, usually network traffic, based on a set of predefined rules. Unwanted content is denied and authorized content is allowed. Also known as a sentry device is called ___?

A

FIREWALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A complete Internet host name including a top level domain name, registered domain name, possibly one or more sub-domain names, and a host name and is called ___?

A

FULLY QUALIFIED DOMAIN NAME (FQDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A person who performs hacking. Modern use of this term now implies malicious or criminal intent by the hacker, although criminals are more correctly known as “crackers.” This is called a ___?

A

HACKER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The act of producing a result not intended by the designer of a system. Hackers may perform such acts out of curiosity or malice and is called ___?

A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The process of securing or locking down a host against threats and attacks. This can include removing unnecessary software, installing updates, and imposing secure configuration settings is called ___?

A

HARDENING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

This attack occurs when a hacker uses a network sniffer to watch a communications session to learn its parameters. Then disconnects one of the session’s hosts. Impersonates the offline system, and then begins injecting crafted packets into the communication stream. If successful, the person takes over the session of the offline host, while the other host is unaware of the switch is called ___?

A

HIJACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A node that has a logical address assigned to it, usually an IP address. This typically implies that the node operates at and/or above the network layer. This would include clients, servers, firewalls, proxies, and even routers. This excludes switches, bridges, and other physical devices such as repeaters and hubs and is called a ___?

A

HOST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A static file on every IP enabled host where FDQN to IP address resolutions can be hard coded and is called ___?

A

HOSTS FILE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Filtering traffic as it attempts to enter a network. This can include monitoring for spoofed addresses, malformed packets, unauthorized ports and protocols, and blocked destination is called ___?

A

INGRESS FILTERING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The security service of preventing unauthorized changes to data is called ___?

A

INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A security mechanism to detect unauthorized user activities, attacks, and network compromise. It can respond in a passive manner through alerts and logging or in an active manner by disconnecting session is called ___?

A

INTRUSION DETECTION SYSTEM (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A security mechanism to detect and prevent attempts to breach security is called ___?

A

INTRUSION PREVENTION SYSTEM (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

IP protocol encryption services extracted from IPv6 to be used as an add-on component for IPv4. This provides tunnel mode and transport mode encrypted network layer connections between hosts and/or networks is called ___?

A

IPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

An essential part of security and an extension of the written security policy. This defines the business tasks for each person within the organization. This in turn prescribes the authorization personnel need to accomplished these assigned tasks is called ___?

A

JOB DESCRIPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A network confined to a limited geographic distance. Generally, this is comprised of segments that are fully owned and controlled by the host organization as opposed to using lines leased from telcos is called ___?

A

LOCAL AREA NETWORK (LAN)

48
Q

A log is a recording or notation of activities. Many security services, applications, and network resources automatically create a log of all events is called __?

A

LOG

49
Q

The act of creating or recording events into a log. It is similar to auditing and monitoring and is called ___?

A

LOGGING

50
Q

Any software that was written with malicious intent. Administrators use antivirus and anti-malware scanners to detect and prevent malicious code from causing harm within a private network or computer is called ___?

A

MALICIOUS CODE (OR MALWARE)

51
Q

This attack occurs when a hacker is positioned between a client and a server and the client is fooled into connecting with the hacker computer instead of the real server. The attack performs a spoofing attack to trick the client. As a result, the connection between the client and server is proxies by the hacker. This allow the hacker to eavesdrop and manipulate the communications is called ___?

A

MAN-IN-THE-MIDDLE

52
Q

The physical address assigned to a network interface by the manufacturer. This is a 48-bit binary address presented in as hexadecimal pairs separated by colons. The first half of this address is known as the Organizationally Unique Identifier or vender ID, the last half is the uniques serial number of the NIC and is called ___?

A

MEDIA ACCESS CONTROL (MAC) ADDRESS

53
Q

The act of watching for abnormal or unwanted circumstances. Commonly used interchangeably with logging and auditing and is called ___?.

A

MONITOR OR MONITORING

54
Q

A mechanism that limits access or admission to a network based on the security compliance of a host is called ___?

A

NETWORK ACCESS CONTROL (NAC)

55
Q

A service that converts between internal addresses and external public addresses. This conversion is performed on packets as they enter or leave the network to mask and modify the internal clients configuration. The primary purpose is to prevent internal IP and network configuration details from being discovered by external entities, such as hackers. This is called ___?

A

NETWORK ADDRESS TRANSLATION (NAT)

56
Q

The collection of security components assembled in a network to support secure internal and external communications. This depends on host security and operates to protect the network as a whole, rather than as individual systems and is called ___?

A

NETWORK SECURITY

57
Q

Any device on the network that can act as the endpoint of a communication. this includes clients, servers, switches, routers, firewalls, and anything with a network interface that has a MAC address. This is called ___?

A

NODE

58
Q

This is a standard conceptual tool used to discuss protocols and their functions. This model has seven layers. Each layer can communicate with its peer layer on the other end of a communication session. While this helps to discuss protocols, most protocols are not in full compliance with it. This is called ___?

A

OPEN SYSTEM INTERCONNECTION REFERENCE MODEL (OSI MODEL)

59
Q

This is an extension of network address translation (NAT) that permits multiple devices on a local area network to be mapped to a single public IP address. This is called ___?

A

PORT ADDRESS TRANSLATION (PAT)

60
Q

An ability to interact with a resource that is granted or denied to a user through some method of authorization or access control, such as access control lists (ACLs) is called ___?

A

PERMISSIONS

61
Q

This keeps information about a network or system user from being disclosed to unauthorized entities. While typically focused on private information like a Social Security number, medical records, credit card number, cell phone numb, etc., this concerns extend to any data that represents personally identifiable information and is called ___?

A

PRIVACY

62
Q

The ranges of IP addresses defined in RFC 1918 for use private networks that are not usable on the Internet is called ___?

A

PRIVATE IP ADDRESS

63
Q

An increased ability to interact with and modify the operating system and desktop environment granted or denied to a user through some method of authorization or access control, such as user rights on a Windows system is called ___?

A

PRIVILEGES

64
Q

A network service that acts as a “middle man” between a client and server. It can hide the identity of the client, filter content, perform NAT services, and cache content. This is called ___?

A

PROXY

65
Q

Any address that is valid for use on the Internet is called ___? This excludes specially reserved addresses such as loopback.

A

PUBLIC IP ADDRESS

66
Q

The feature of network design that ensures the existence of multiple pathways of communication. The purpose is to prevent or avoid single points of failure. This is called ___?

A

REDUNDANCY/REDUNDANT

67
Q

A communications link that enable access to network resources using a wide area network (WAN) link to connect to a geographically distant network. In effect, remote access creates a local network link for a system not physically local to the network. Over this connection, a client system can technically perform all the same tasks as a locally connected client, with the only difference being the speed or the bandwidth of the connection. This is called ___?

A

REMOTE ACCESS

68
Q

This accepts inbound connections from remote clients and is called ___?

A

REMOTE ACCESS SERVER (RAS)

69
Q

The ability to use a local computer system to remotely take control of another computer over a network connection. Often used for remote technical assistance and is called ___?

A

REMOTE CONTROL

70
Q

This attack occurs when a hacker uses a network sniffer to capture network traffic and then retransmits that traffic back on the network at a later time. This often focuses on authentication traffic in the hope that retransmitting the same packets that allowed the real user to log into a system will grant the hacker the same access and is called ___?

A

REPLAY ATTACK

71
Q

Any data item or service available on a computer or network accessible by a user to perform a task is called ___?

A

RESOURCES

72
Q

A document that defines or describes computer and networking technologies. This exists for hardware, populating systems, protocols, security services, and much more. This is called ___?

A

RFC (REQUEST FOR COMMENT)

73
Q
IP addresses that, by convention, are not routed outside a private or closed network.  
Class A 10.0.0.0-10.255.255.255;
Class B 172.16.0.0-172.31.255.255;
Class C 192.168.0.0-192.168.255.255
is known as \_\_\_?
A

RFC 1918 ADDRESSES

74
Q

The likelihood or potential for a threat to take advantage of a vulnerability and cause harm or loss. This is a combination of an asset’s value, exposure level, and rate of occurrence of the threat. This is called ___?

A

RISK

75
Q

A collection of tasks and responsibilities defined by a security policy or description for an individual essential productivity, or security position is called ___?

A

ROLES/JOB ROLES

76
Q

A network device responsible for directing traffic towards its stated destination along the known current available path is called a ___?

A

ROUTER

77
Q

Sets of stated purposes or targets for network security activity. First part include confidentiality, integrity, and availability. Second part are generally more oriented towards achieving or maintaing the goals, such as ensuring the confidentiality of resource. These are called ___?

A

SECURITY GOALS & SECURITY OBJECTIVES

78
Q

The individual or group of highest controlling and responsible authority within an organization. Ultimately the success or failure of network security rest with ___?

A

SENIOR MANAGEMENT

79
Q

A host on a network. This is the computer system that hosts resources accessed by users from clients and is called __?

A

SERVER

80
Q

Any element of a system or network infrastructure, which is the primary or only pathway through which a process occur. The compromise of such an element could result in system failure. Network design should avoid this by including redundancy and defense in depth. This is called ___?

A

SINGLE POINT OF FAILURE

81
Q

A network security service that allows a user to authenticate to an entire domain through a single client log on process. All domain members will accept this single authentication. Local authorization is used to control access to individual resources. This is called ___?

A

SINGLE SIGN-ON (SSO)

82
Q

A software utility or hardware device that captures network communications for investigation and analysis. Also know as packet analyzer, network analyzer, and protocol analyzer and is called ___?

A

SNIFFER

83
Q

Any small network, workgroup, or client/server, deployed by a small business, home based or just a family network at home is called ___?

A

SOHO (SMALL OFFICE, HOME OFFICE NETWORK)

84
Q

A device, which provides network segmentation through hardware. Across this, temporary dedicated electronic communication pathways are created between the endpoints of a session. This pathway prevents collisions. Additionally, it allows the communication to use the full potential throughput capacity of the network connection, instead of 40 percent or more being wasted by collisions. This is called ___?

A

SWITCH

85
Q

This is short for telecommunication company or corporation. Used to refer to any company that sells or leases WAN connection service whether wired or wireless and is called ___?

A

TELCO

86
Q

A modern form of legacy thin client operation. A thin client software utility connects to a central terminal server, which stimulates remote control. A terminal service system can support multiple simultaneous connection. When this is in use, the client workstation converts to a thin client status. All operations of storage and processing then take place on the ___.

A

TERMINAL SERVER/SERVICES/SESSION

87
Q

A legacy terminal concept used to control mainframes. These had no local processing or storage capability. These simulate these limitations and perform all operations on the terminal server, remote control server, or ___.

A

THIN CLIENT

88
Q

Any potential harm to a resource or node on the network. threats can be natural or artificial, caused by mother nature or man, or by the result of ignorance or malicious intent. Threats originate internally and externally. This is called ___?

A

THREAT

89
Q

Confidence in the expectation that others will act in your best interest, or that a resource is authentic. On computer networks, this is the confidence that other users will act in accordance with the organization’s security rules and not attempt to violate stability, privacy, or integrity of the network and its resources. This is called ___?

A

TRUST

90
Q

The act of transmitting a protocol across an intermediary network by encapsulating it in another protocol is called ___?

A

TUNNELING

91
Q

A mechanism to establish a secure remote access connection across an intermediary network, often the Internet. This allows inexpensive insecure links to replace expensive security links. This allows for cheap long distance connections established over the Internet. This is called ___?

A

VIRTUAL PRIVATE NETWORK (VPN)

92
Q

A weakness or flaw in a host, node, or any other infrastructure component that a hacker can discover and exploit. Security management aims to discover and eliminate such ___.

A

VULNERABILITY

93
Q

A type of filtering concept where the network denies all activities except for those on this. This is called ___?

A

WHITE LIST

94
Q

A form of networking where each computer is a peer. Peers are equal to each other in terms of how much power or controlling authority any one system has over the other members. All members are on equal footing because they can manage their own local resources and users and this is called a ___?

A

WORKGROUP

95
Q

New and previous unknown attacks for which there are no current specific defenses. This refers to the newness of an exploit, which may be known in the hacker community for days or weeks. This is called ___?

A

ZERO DAY EXPLOITS

96
Q

The process of purging a storage device by writing zeros to all addressable locations on the device. This contains no data remnants that other users could potentially recover and is called ___?

A

ZEROIZATION

97
Q
  1. An outsider needs access to a resource hosted in your extranet. The outside is a stranger to you, but one of your largest distributors vouches for them. If you allow them access to the resource, this is know as implementing what?
  2. DMZ
  3. virtualization
  4. trusted third party
  5. remote control
  6. encapsulation
A

Trusted third party

98
Q
  1. Which of the following are common security objectives?
  2. Non-repudiation
  3. confidentiality
  4. Integrity
  5. availability
  6. All the above
A

Non-repudiation
Confidentiality
Integrity
Availability

ALL CORRECT

99
Q
  1. What is an asset?
  2. Anything used in a business task
  3. Only objects of monetary value
  4. A business process
  5. Job descriptions
  6. Security policy
A

Anything used in a business task

100
Q
  1. What is the benefit of learning to think like a hacker?
  2. Exploiting weaknesses in targets
  3. Protecting vulnerabilities before they are compromised
  4. Committing crimes without getting caught
  5. Increase in salary
  6. Better network design
A

Protecting vulnerabilities before they are compromised

101
Q
  1. What is the most important part of an effective security goal?
  2. That it is inexpensive
  3. That it is possible with currently deployed technologies
  4. That it is written down
  5. That it is approved by all personnel
  6. That it is a green initiative
A

That it is written down

102
Q
  1. What is true about every security component or device?
  2. They are all interoperable
  3. The are all compatible with both IPv4 and IPv6
  4. They always enforce confidentiality, integrity, and availability
  5. They are sold with pre-defined security plans
  6. They all have flaws or limitations
A

They all have flaws or limitations

103
Q
  1. Who is responsible for network security?
  2. Senior management
  3. IT and security staff
  4. End users
  5. Everyone
  6. Consultants
A

Consultants

104
Q
  1. What is a distinguishing feature between workgroups and client/server networks? (Or, what feature is common to one of these but not both?)
  2. DNS
  3. Centralized authentication
  4. List of shared resources
  5. User accounts
  6. Encryption
A

Centralized authentication

105
Q
  1. Remote control is to thin clients as remote access is to ___?
  2. NAC
  3. VPN
  4. DNS
  5. IPS
  6. ACL
A

VPN

106
Q
  1. What two terms are closely associated with VPNs?
  2. Tunneling and encapsulation
  3. Bridging and filtering
  4. Path and network management
  5. Encapsulation and decapsulation
  6. Port forwarding and port blocking
A

Tunneling and encapsulation

107
Q
  1. What is a difference between a DMZ and an extranet?
  2. VPN required for access
  3. Hosted resources
  4. External user access
  5. Border or boundary network
  6. Isolation from the private LAN
A

VPN required for access

108
Q
  1. What is the primary security concern with wireless connections?
  2. Encrypted traffic
  3. Support for IPv6
  4. Speed of connection
  5. Filtering of content
  6. Signal propagation
A

Signal propagation

109
Q
  1. What are two elements of network design that have the greatest risk of causing a SoS?
  2. Directory service
  3. Single point of failure
  4. Bottlenecks
  5. Both 1 and 2
  6. Both 2 and 3
A

Single point of failure

Bottlenecks

110
Q
  1. For what type of threat are there no current defenses?
  2. Information leakage
  3. Flooding
  4. Buffer overflow
  5. Zero day
  6. Hardware failure
A

Zero day

111
Q
  1. Which of the following is true regarding a layer 2 address and layer 3 address?
  2. MAC address is at layer 2 and is routable
  3. Layer 2 address contains a network number
  4. Layer 2 address can be filtered with MAC address filtering
  5. Network layer address is at layer 3 and routable
  6. Both 3 and 4
A

Layer 2 address can be filtered with MAC address filtering &
Network layer address is at layer 3 and routable

112
Q
  1. Which of the following are NOT benefits of IPv6?
  2. Native communication encryption
  3. RFC 1918 address
  4. Simplified routing
  5. Large address space
  6. Smaller packet header
A

RFC 1918 address

113
Q
  1. What is the most common default security stance employed on firewalls?
  2. Allowing by default
  3. Custom configuring of access based on user account
  4. Caching Internet content
  5. Denying by default, allowing by exception
  6. Using best available path
A

Denying by default, allowing by exception

114
Q
  1. What is egress filtering?
  2. Investigating packets as they enter a subnet
  3. Allowing by default, allowing by exception
  4. Examining traffic as it leaves a network
  5. Prioritizing access based on job description
  6. Allowing all outbound communications without restriction
A

Examining traffic as it leaves a network

115
Q
  1. Which of the following is NOT a feature of a proxy server?
  2. Caching Internet content
  3. Filtering content
  4. Hiding the identity of a requester
  5. Offering NAT services
  6. MAC address filtering
A

MAC address filtering

116
Q
  1. Which of the following is allowed under NAC if a host is lacking a security patch?
  2. Access to the Internet
  3. Access to email
  4. Access to Web-based technical support
  5. Access to file servers
  6. Access to remediation servers
A

Access to remediation servers