Question1. Name two benefits of Stateful Inspection Packet Filtering Routers.
Question2. Name two benefits that firewalls add to a network
Question3. Name two benefits of the Dual Homed Bastion Host firewall architecture
Question4. Name two benefits of the Screened Subnet or DMZ Firewall architecture
Question5. You just discovered a knowledgeable insider has planted a logic bomb in your shipping applications and is demanding $50,000,000 to disable it. What do you do
Choose the best answer:
Question6. The three devices most commonly used for perimeter protection are:
A) Application servers, firewalls, and databases
B) Routers, Firewalls, and IDSs
C) Web server, application server, database serv
D) Router, Web server, Firewall
Question7. What are the two types of detection that an IDS can provide?
A) Misuse and anomaly
B) Denial of service detection and HTTP attacks
C) Fragment and offset
D) ICMP and TCP
Question8. The three things that must be considered for the planning and implementation of security controls are:
A- Threats, assets, and business objectives
B- Threats, vulnerabilities, and risks
C- Vulnerabilities, secret keys, and exposures
D- Exposures, threats, and countermeasures
Question9. Separation of Duties is based on which principle?
A-An operator does not know more about the system than the minimum required to do the job
B-Two operators are required to work in tandem to perform a task
C-Operator duties are rotated frequently
D- Operators have different duties to prevent one person working alone to compromise the system
Question10. An orchestrated attack on an Internet site intended to disrupt communications is called
A- Blended attack
B- Coordinated attack
C- Denial of Service attack
D- Penetration test.