Search Header Logo

COM450 CH7 QUIZ

Authored by Katrina Weicht

Computers

University

Used 1+ times

COM450 CH7 QUIZ
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

When is a reverse proxy useful?

To grant outside users access to internal email servers

To support internal users accessing the public Internet

To allow internal users to access external web servers

To offer external entities access to an internal web server

Answer explanation

Allows clients to use a single public address to access a cluster of internal web servers

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is an event found in a firewall log file that is a symptom of a rogue host operating within the private network?

Packets from an unassigned internal address

Packets to an unknown port on an internal host

Packets in a serial grouping, attempting to access a series of ports

Packets that are all exactly the same, directed toward a single target

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which security strategy is based on locking the environment down so users can perform their assigned tasks, but little else?

Creating chokepoints

Diversity of defense

Principle of least privilege

Separation of duties

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following statements is true regarding a reverse proxy?

The reverse proxy server can act as the endpoint for a TLS tunnel.

A reverse proxy cannot be used in conjunction with secured websites.

A reverse proxy can be used with tunnel mode IPSec VPNs.

A reverse proxy cannot support simultaneous SSL tunnels.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is the most important feature of a bastion host OS?

Leveraging existing OS administrative knowledge

Inherent ease of use

Resistance to attacks and compromise attempts

Unlimited remote administration

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

When considering deployment of an IDS or IPS, what is the biggest problem?

Failing anomaly detection

False positives

False negatives

Failing to operate at wire speed

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a highly recommended method or technique for keeping firewall logs secure and uncorrupted?

Storing the logs in binary form

Using high-capacity hard drives

Using timestamps

Using WORM drives

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?