Show
Which of the following access control processes confirms the identity of the entity seeking access to a logical or physical area? Free Multiple Choice Which of the following biometric authentication systems is considered to be the most secure? Free Multiple Choice Which tool can best identify active computers on a network? Free Multiple Choice Which of the following is NOT among the three types of authentication mechanisms? Multiple Choice Secure Shell (SSH)provides security for remote access connections over public networks by creating a secure and persistent connection.. True False The "something a person has" authentication mechanism takes advantage of something inherent in the user that is evaluated using biometrics. True False Which of the following is true about firewalls and their ability to adapt in a network? Multiple Choice Which of the following is NOT a method employed by IDPSs to prevent an attack from succeeding? Multiple Choice The intermediate area between trusted and untrusted networks is referred to as which of the following? Multiple Choice The KDC component of Kerberos knows the secret keys of all clients and servers on the network. True False Which of the following biometric authentication systems is the most accepted by users? Multiple Choice The ability to restrict specific services is a common practice in most modern routers,and is invisible to the user. True False Which type of firewall keeps track of each network connection established between internal and external systems? Multiple Choice Which technology employs sockets to map internal private network addresses to a public address using a one-to-many mapping? Multiple Choice Which type of IDPS is also known as a behavior-based intrusion detection system? Multiple Choice Which type of device allows only specific packets with a particular source,destination,and port address to pass through it. Multiple Choice Which of the following is a commonly used criteria used to compare and evaluate biometric technologies? Multiple Choice What is the next phase of the preattack data gathering process after an attacker has collected all of an organization's Internet addresses? Multiple Choice Technical controls alone,when properly configured,can secure an IT environment. True False Which of the following characteristics currently used today for authentication purposes is the LEAST unique? Multiple Choice Which type of device allows only specific packets with a particular source destination and port address to pass through it?The static packet filtering firewall allows only a particular packet with a particular source, destination, and port address to enter through the firewall.
Which type of firewall keeps track of each network connection?A stateful firewall keeps track of the state of communications sessions. It monitors the incoming and outgoing packets in each TCP connection.
Which technology has two modes of operation transport and tunnel?IPSec operates in two modes: Transport mode and Tunnel mode. You use transport mode for host-to-host communications. In transport mode, the data portion of the IP packet is encrypted, but the IP header is not.
Which type of IDPS is also known as a behavior based intrusion detection system quizlet?Statistical Anomaly-based IDS - Also known as behavior-based detection, an IDPS detection method that compares current data and traffic patterns to an established baseline of normalcy.
|