Test 2 - Quiz Review Flashcards
A ________ firewall handles all traditional firewall functions (SPI, ACLs, etc.) as well as additional security functions such as antivirus filtering, spam filtering, application proxy filtering, and so forth.
unified threat management
What is the SPI firewall rule for packets that only have their TCP ACK bits set but no other flags set?
pass the packet if it is part of a previously approved connection
Application proxy firewalls can always examine application layer content.
True
________ drop packets.
IPSs
A ________ port number designates a specific application running on a server.
well-known
What is the SPI firewall rule for packets that do not attempt to open connections?
pass the packet if it is part of a previously approved connection
The combination of high safety and low cost makes SPI firewalls extremely popular.
True
What type of filtering do IDSs do?
Deep-packet inspection
________ firewalls always examine application messages in depth.
Application proxy
A ________ is a persistent conversation between different programs on different computers.
connection
You can quickly assess the general security posture of your Windows Vista PC by using the status check in the Windows Security Center.
True
After access is granted to a network, many NACs continue to monitor network PCs.
True
Computer recover software reports its physical location to a recovery company that works with the local police to recover the notebook.
False
UNIX offers more directory and file permissions than Windows.
False
A(n) ________ is a security weakness that makes a program vulnerable to attack.
vulnerability
The Local Users and Groups snap-in is available on the ________ MMC.
Computer Management
A(n) ________ is a program that takes advantage of a(n) ________.
exploit, vulnerability
To how many accounts and groups can different permissions be applied in Windows?
almost an unlimited number
Assigning security measures to individuals within groups is cheaper than assigning security measures to groups.
False
To get to the super user account in UNIX, the administrator can use the RunAs command.
False
In Internet Explorer, the Security tab controls the website’s pop-up blocker.
False
Operating system account passwords provide limited protection.
True (lack of granularity)
Testers have permissions on the ________.
Testing server