COM450 CH7 QUIZ

COM450 CH7 QUIZ

University

9 Qs

quiz-placeholder

Similar activities

Firewall and Network Security Quiz

Firewall and Network Security Quiz

Firewalls

Firewalls

Firewalls mid-term exam review

Firewalls mid-term exam review

Network Security Quiz

Network Security Quiz

Firewalls 5.3

Firewalls 5.3

Cybersecurity Quiz

Cybersecurity Quiz

COM450 CH7 QUIZ

COM450 CH7 QUIZ

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Katrina Weicht

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

When is a reverse proxy useful?

To grant outside users access to internal email servers

To support internal users accessing the public Internet

To allow internal users to access external web servers

To offer external entities access to an internal web server

Answer explanation

Allows clients to use a single public address to access a cluster of internal web servers

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is an event found in a firewall log file that is a symptom of a rogue host operating within the private network?

Packets from an unassigned internal address

Packets to an unknown port on an internal host

Packets in a serial grouping, attempting to access a series of ports

Packets that are all exactly the same, directed toward a single target

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which security strategy is based on locking the environment down so users can perform their assigned tasks, but little else?

Creating chokepoints

Diversity of defense

Principle of least privilege

Separation of duties

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following statements is true regarding a reverse proxy?

The reverse proxy server can act as the endpoint for a TLS tunnel.

A reverse proxy cannot be used in conjunction with secured websites.

A reverse proxy can be used with tunnel mode IPSec VPNs.

A reverse proxy cannot support simultaneous SSL tunnels.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is the most important feature of a bastion host OS?

Leveraging existing OS administrative knowledge

Inherent ease of use

Resistance to attacks and compromise attempts

Unlimited remote administration

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

When considering deployment of an IDS or IPS, what is the biggest problem?

Failing anomaly detection

False positives

False negatives

Failing to operate at wire speed

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a highly recommended method or technique for keeping firewall logs secure and uncorrupted?

Storing the logs in binary form

Using high-capacity hard drives

Using timestamps

Using WORM drives

8.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which security stance focuses on the use of firewalls as its primary means of controlling communications?

Chokepoint

Universal participation

Fail-safe

Weakest link

9.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which term describes the deployment of multiple subnets in a series of private resources from public?

Diverse

Separation

N-tier

DMZ