
COM450 CH7 QUIZ
Quiz
•
Computers
•
University
•
Practice Problem
•
Hard
Katrina Weicht
Used 1+ times
FREE Resource
Enhance your content in a minute
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
When is a reverse proxy useful?
To grant outside users access to internal email servers
To support internal users accessing the public Internet
To allow internal users to access external web servers
To offer external entities access to an internal web server
Answer explanation
Allows clients to use a single public address to access a cluster of internal web servers
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is an event found in a firewall log file that is a symptom of a rogue host operating within the private network?
Packets from an unassigned internal address
Packets to an unknown port on an internal host
Packets in a serial grouping, attempting to access a series of ports
Packets that are all exactly the same, directed toward a single target
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which security strategy is based on locking the environment down so users can perform their assigned tasks, but little else?
Creating chokepoints
Diversity of defense
Principle of least privilege
Separation of duties
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following statements is true regarding a reverse proxy?
The reverse proxy server can act as the endpoint for a TLS tunnel.
A reverse proxy cannot be used in conjunction with secured websites.
A reverse proxy can be used with tunnel mode IPSec VPNs.
A reverse proxy cannot support simultaneous SSL tunnels.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is the most important feature of a bastion host OS?
Leveraging existing OS administrative knowledge
Inherent ease of use
Resistance to attacks and compromise attempts
Unlimited remote administration
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
When considering deployment of an IDS or IPS, what is the biggest problem?
Failing anomaly detection
False positives
False negatives
Failing to operate at wire speed
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is a highly recommended method or technique for keeping firewall logs secure and uncorrupted?
Storing the logs in binary form
Using high-capacity hard drives
Using timestamps
Using WORM drives
8.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which security stance focuses on the use of firewalls as its primary means of controlling communications?
Chokepoint
Universal participation
Fail-safe
Weakest link
9.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which term describes the deployment of multiple subnets in a series of private resources from public?
Diverse
Separation
N-tier
DMZ
Similar Resources on Wayground
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
20 questions
christmas songs
Quiz
•
KG - University
20 questions
Holiday Trivia
Quiz
•
9th Grade - University
15 questions
Holiday Movies
Quiz
•
University
14 questions
Christmas Trivia
Quiz
•
3rd Grade - University
20 questions
Christmas Trivia
Quiz
•
University
8 questions
5th, Unit 4, Lesson 8
Lesson
•
KG - Professional Dev...
20 questions
Disney Trivia
Quiz
•
University
