Emmen Kap 4

Which of the following elements and issues should be considered whendeciding whether to use a software or hardware firewall? (Choose all thatapply.)
Host operating system
Application conflicts
Operating system version
Firewall service efficiency
Stability
Which of the following are layers of the OSI model? (Choose all thatapply.)
Physical
Control
Application
Network
Encryption
At which layer of the OSI model does routing occur?
Physical
Data link
Transport
Session
Network
Which of the following are valid firewall types? (Choose the best answer.)
Virtual
Network
Packet filtering
IPsec
Application
Which of the following pieces of information are typically examined by astateful inspection firewall?
IP address of the sending host
IP address of the receiving host
IP address of the router
Data packet type
Data packet size
What is the purpose of NAP? (Choose the best answer.)
NAP translates private IP addresses to Internet-routable IP addresses.
NAP permits a firewall to perform deep inspection on packets.
NAP provides a mechanism to perform network analysis on captured packets.
NAP controls what systems are permitted to connect to a network.
An attack that relies on having a user execute a malicious script embeddedin a web page is which kind of attack? (Choose the best answer.)
Man in the middle
Brute force
Cross-site scripting
SQL injection
You have just purchased a new wireless access point for your smallcomputer services company, and you want to ensure that only your systemsare able to connect to the wireless network. To that end, you enable MACaddress filtering and put the MAC addresses of all your computers in the permitted table. At what layer of the OSI model does this filtering occur?
Physical
Data link
Network
Transport
Session
You are the Information Security Officer for a medium-sized manufacturingcompany, and your sales team has just deployed a new e-commerceapplication to allow for the direct sale of your products to your customers.To secure this application, you are deploying an application firewall. Atwhat layer of the OSI model does this filtering occur? (Select all answersthat apply.)
Physical
Data link
Network
Presentation
Application
Which of the following are components of Network Access Protection?(Choose all that apply.)
MAC address compliance
Health policy compliance
Limited access mode
IP address mode
Health state validation
Which of the following are password-based attacks? (Choose all that apply.)
Replay attacks
Network sniffer attacks
Brute force attacks
Man in the middle attacks
Dictionary attacks
What type of attack relies on the attacker tricking the sending host intothinking his or her system is the receiving host, and the receiving host intothinking his or her system is the sending host? (Choose the best answer.)
Replay attack
Brute force attack
Man in the middle attack
Cross-site scripting attack
SQL injection attack
Which of the following systems cannot participate in a NAPimplementation? (Choose all that apply.)
Windows 7 Home
Windows 7 Home Premium
Windows XP Service Pack 2
Windows Vista Ultimate
Windows 7 Professional
Which of the following are common uses for a VPN?
Remote access
Server isolation
Intrusion detection
Extranet connections
Domain isolation
Which of the following are common types of routing protocols? (Choose allthat apply.)
Link vector
Dynamic link
Distance link
Distance vector
Link state
{"name":"Emmen Kap 4", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which of the following elements and issues should be considered whendeciding whether to use a software or hardware firewall? (Choose all thatapply.), Which of the following are layers of the OSI model? (Choose all thatapply.), At which layer of the OSI model does routing occur?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker