Ask DBMS Expert


Home >> DBMS

Question 1. What should a company consider installing on the network perimeter to prevent direct connections between the internal network and the Internet to help protect its data warehouses and employee privacy?

Router
VPN server
ICMP monitor
Proxy server

Question 2. The Cisco PIX line of products is best described as which of the following?

software firewall
PC with firewall installed
firewall appliance
VPN gateway

Question 3. Which of the following is a typical drawback of a free firewall program?

cannot monitor traffic in real time
oversimplified configuration
have centralized management
more expensive than hardware firewalls

Question 4. Which of the following is an advantage of hardware firewalls?

not scalable compared to software firewalls
not dependent on a conventional OS
less expensive than software firewalls
easy to patch

Question 5. What are the two standard ports used by FTP along with their function?

UDP 23 control, TCP 20 data
UDP 20 data, TCP 21 control
TCP 21 control, TCP 20 data
TCP 23 data, TCP 21 control

Question 6. Which of the following is true about private IP addresses?

they are assigned by the IANA
they are not routable on the Internet
they are targeted by attackers
NAT was designed to conserve them

Question 7. Which type of security device can speed up Web page retrieval and shield hosts on the internal network?

caching firewall
proxy server
caching-only DNS server
DMZ intermediary

Question 8. Which of the following is true about a dual-homed host?

serves as a single point of entry to the network
its main objective is to stop worms and viruses
uses a single NIC to manage two network connections
it is used as a remote access server in some configurations

Question 9. Which type of translation should you use if you need 50 computers in the corporate network to be able to access the Internet using a single public IP address?

one-to-one NAT
port address translation
one-to-many NAT
DMZ proxy translation

Question 10. Which of the following is a disadvantage of using a proxy server?

shields internal host IP addresses

slows Web page access
may require client configuration
can't filter based on packet content

Question 11. Which of the following is a type of VPN connection?

site-to-server
client-to-site
server-to-client
remote gateway

Question 12. Which of the following is NOT a factor a secure VPN design should address?

Encryption
Authentication
Nonrepudiation
performance

Question 13. Which IPsec component authenticates TCP/IP packets to ensure data integrity?

AH
ESP
IKE
ISAKMP

Question 14. Which of the following is NOT an essential element of a VPN?

VPN server
Tunnel
VPN client
authentication server

Question 15. Which of the following is NOT true about a hardware VPN?

should be the first choice for fast-growing networks
can handle more traffic than software VPNs
have more security vulnerabilities than software VPNs
create a gateway-to-gateway VPN

Question 16. Which of the following is true about the Internet?

it is the same as the World Wide Web
it was established in the mid-1960s
it was developed by a network of banks and businesses
it was originally built on an extended star topology

Question 17. Which of the following is a highly secure public facility in which backbones have interconnected data lines and routers that exchange routing and traffic data?

ISP
POP
NAP
NSF

Question 18. What makes IP spoofing possible for computers on the Internet?

network address translation
the lack of authentication
the 32-bit address space
the DNS hierarchy

Question 19. What type of attack displays false information masquerading as legitimate data?

Java applet
Phishing
Buffer overflow
SQL injection

Question 20. Which of the following best describes ROI?

the chance that a threat will result in lost money
how long before an investment will pay for itself
the cost of mitigating a threat

the benefits of setting security priorities

Question 21. What is considered the first step in formulating a security policy?

risk analysis
elimination of threats
risk reduction
system monitoring

Question 22. Which of the following best describes a Monte Carlo simulation?

a technique for simulating an attack on a system
a formula that estimates the cost of countermeasures
a procedural system that simulates a catastrophe
an analytical method that simulates a real-life system for risk analysis

Question 23. Which of the following is a security-related reason for monitoring and evaluating network traffic?

to determine if your IDPS signatures are working well
to create substantial data to analyze
to optimize your router and switch protocols
to see how many files employees download form the Internet

Question 24. Which of the following is NOT typically an aspect of a security event management program?

monitoring events
managing IDPS firmware
managing data from sensors
managing change

Question 25. What should an outside auditing firm be asked to sign before conducting a security audit?

subpoena

nondisclosure agreement
search and seizure contract
social engineering covenant

DBMS, Programming

  • Category:- DBMS
  • Reference No.:- M91336314
  • Price:- $40

Guranteed 36 Hours Delivery, In Price:- $40

Have any Question?


Related Questions in DBMS

Data mining assignment -in this assignment you are asked to

Data Mining Assignment - In this assignment you are asked to explore the use of neural networks for classification and numeric prediction. You are also asked to carry out a data mining investigation on a real-world data ...

Sql query assignment -for this assignment you are to write

SQL Query Assignment - For this assignment you are to write your answers in a word document. This assignment is in three parts: Part A (reporting queries), Part B (query performance), Part C (query design). For this assi ...

The groceries datasetimagine 10000 receipts sitting on your

The groceries Dataset Imagine 10000 receipts sitting on your table. Each receipt represents a transaction with items that were purchased. The receipt is a representation of stuff that went into a customer's basket. That ...

You are in a real estate business renting apartments to

You are in a real estate business renting apartments to customers. Your job is to define an appropriate schema using SQL DDL in MySQL. The relations are Property(Id, Address, NumberOfUnits), Unit(ApartmentNumber, Propert ...

Objectivethe objective of this lab is to be familiar with a

OBJECTIVE: The objective of this lab is to be familiar with a process in big data modeling. You're required to produce three big data models using the MS PowerPoint software. This tool is available on UMUC Virtual Deskto ...

The relation memberstudentid organizationid roleid stores

The relation Member(StudentId, OrganizationId, RoleId) stores the membership information of student joining organization. For example, ('S1', 'O2', 'R3') indicates that student with Id 'S1' joined the organization with i ...

Relational database exerciseyou have been assigned to a new

Relational Database Exercise: You have been assigned to a new development team. A client is requesting a relational database system to manage their present store with the anticipation of adding more stores in the future. ...

Relational database design a given the following business

Relational Database Design A) Given the following business rules, identify entity types, attributes (at least two attributes for each entity, including the primary key) and relationships, and then draw an Entity-Relation ...

We can represent a data set as a collection of object nodes

We can represent a data set as a collection of object nodes and a collection of attribute nodes, where there is a link between each object and each attribute, and where the weight of that link is the value of the object ...

Data model development and implementationpurpose of the

Data model development and implementation Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to develop data models and map Database System into a standard development environment to gain unde ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As