Which technology employs sockets to map internal private network addresses to a public address using one to many mapping?

Which of the following access control processes confirms the identity of the entity seeking access to a logical or physical area? 

Free

Multiple Choice

Which of the following biometric authentication systems is considered to be the most secure? 

Free

Multiple Choice

Which tool can best identify active computers on a network? 

Free

Multiple Choice

Which of the following is NOT among the three types of authentication mechanisms? 

Multiple Choice

Secure Shell (SSH)provides security for remote access connections over public networks by creating a secure and persistent connection..

True False

The "something a person has" authentication mechanism takes advantage of something inherent in the user that is evaluated using biometrics.

True False

Which of the following is true about firewalls and their ability to adapt in a network? 

Multiple Choice

Which of the following is NOT a method employed by IDPSs to prevent an attack from succeeding? 

Multiple Choice

The intermediate area between trusted and untrusted networks is referred to as which of the following? 

Multiple Choice

The KDC component of Kerberos knows the secret keys of all clients and servers on the network.

True False

Which of the following biometric authentication systems is the most accepted by users? 

Multiple Choice

The ability to restrict specific services is a common practice in most modern routers,and is invisible to the user.

True False

Which type of firewall keeps track of each network connection established between internal and external systems? 

Multiple Choice

Which technology employs sockets to map internal private network addresses to a public address using a one-to-many mapping? 

Multiple Choice

Which type of IDPS is also known as a behavior-based intrusion detection system? 

Multiple Choice

Which type of device allows only specific packets with a particular source,destination,and port address to pass through it.

Multiple Choice

Which of the following is a commonly used criteria used to compare and evaluate biometric technologies? 

Multiple Choice

What is the next phase of the preattack data gathering process after an attacker has collected all of an organization's Internet addresses? 

Multiple Choice

Technical controls alone,when properly configured,can secure an IT environment.

True False

Which of the following characteristics currently used today for authentication purposes is the LEAST unique? 

Multiple Choice

Which type of device allows only specific packets with a particular source destination and port address to pass through it?

The static packet filtering firewall allows only a particular packet with a particular source, destination, and port address to enter through the firewall.

Which type of firewall keeps track of each network connection?

A stateful firewall keeps track of the state of communications sessions. It monitors the incoming and outgoing packets in each TCP connection.

Which technology has two modes of operation transport and tunnel?

IPSec operates in two modes: Transport mode and Tunnel mode. You use transport mode for host-to-host communications. In transport mode, the data portion of the IP packet is encrypted, but the IP header is not.

Which type of IDPS is also known as a behavior based intrusion detection system quizlet?

Statistical Anomaly-based IDS - Also known as behavior-based detection, an IDPS detection method that compares current data and traffic patterns to an established baseline of normalcy.