Cash-back offer from May 2nd to 7th, 2024: Get a flat 10% cash-back credited to your account for a minimum transaction of $50.Post Your Questions Today!

Question DetailsNormal
$ 24.00

Saint COm530 quiz 3 module 8 (100% Answer)

Question posted by
Online Tutor Profile
request

Question

Question 1.1.What should a company consider installing on the network perimeter to prevent direct connections between the internal network and the Internet to help protect its data warehouses and employee privacy?

(Points : 4)

 router

 VPN server

 ICMP monitor

 proxy server

Question 2.2.The Cisco PIX line of products is best described as which of the following? (Points : 4)

 software firewall

 PC with firewall installed

 firewall appliance

 VPN gateway

Question 3.3.Which of the following is a typical drawback of a free firewall program? (Points : 4)

 cannot monitor traffic in real time

 oversimplified configuration

 have centralized management

 more expensive than hardware firewalls

Question 4.4.Which of the following is an advantage of hardware firewalls? (Points : 4)

 not scalable compared to software firewalls

 not dependent on a conventional OS

 less expensive than software firewalls

 easy to patch

Question 5.5.What are the two standard ports used by FTP along with their function? (Points : 4)

 UDP 23 control, TCP 20 data

 UDP 20 data, TCP 21 control

 TCP 21 control, TCP 20 data

 TCP 23 data, TCP 21 control

Question 6.6.Which of the following is true about private IP addresses? (Points : 4)

 they are assigned by the IANA

 they are not routable on the Internet

 they are targeted by attackers

 NAT was designed to conserve them

Question 7.7.Which type of security device can speed up Web page retrieval and shield hosts on the internal network? (Points : 4)

 caching firewall

 proxy server

 caching-only DNS server

 DMZ intermediary

Question 8.8.Which of the following is true about a dual-homed host? (Points : 4)

 serves as a single point of entry to the network

 its main objective is to stop worms and viruses

 uses a single NIC to manage two network connections

 it is used as a remote access server in some configurations

Question 9.9.Which type of translation should you use if you need 50 computers in the corporate network to be able to access the Internet using a single public IP address? (Points : 4)

 one-to-one NAT

 port address translation

 one-to-many NAT

 DMZ proxy translation

Question 10.10.Which of the following is a disadvantage of using a proxy server? (Points : 4)

 shields internal host IP addresses

 slows Web page access

 may require client configuration

 can't filter based on packet content

Question 11.11.Which of the following is a type of VPN connection? (Points : 4)

 site-to-server

 client-to-site

 server-to-client

 remote gateway

Question 12.12.Which of the following is NOT a factor a secure VPN design should address? (Points : 4)

 encryption

 authentication

 nonrepudiation

 performance

Question 13.13.Which IPsec component authenticates TCP/IP packets to ensure data integrity? (Points : 4)

 AH

 ESP

 IKE

 ISAKMP

Question 14.14.Which of the following is NOT an essential element of a VPN? (Points : 4)

 VPN server

 tunnel

 VPN client

 authentication server

 

Question 15.15.Which of the following is NOT true about a hardware VPN? (Points : 4)

 should be the first choice for fast-growing networks

 can handle more traffic than software VPNs

 have more security vulnerabilities than software VPNs

 create a gateway-to-gateway VPN

Question 16.16.Which of the following is true about the Internet? (Points : 4)

 it is the same as the World Wide Web

 it was established in the mid-1960s

 it was developed by a network of banks and businesses

 it was originally built on an extended star topology

Question 17.17.Which of the following is a highly secure public facility in which backbones have interconnected data lines and routers that exchange routing and traffic data? (Points : 4)

 ISP

 POP

 NAP

 NSF

Question 18.18.What makes IP spoofing possible for computers on the Internet? (Points : 4)

 network address translation

 the lack of authentication

 the 32-bit address space

 the DNS hierarchy

Question 19.19.What type of attack displays false information masquerading as legitimate data? (Points : 4)

 Java applet

 phishing

 buffer overflow

 SQL injection

Question 20.20.Which of the following best describes ROI? (Points : 4)

 the chance that a threat will result in lost money

 how long before an investment will pay for itself

 the cost of mitigating a threat

 the benefits of setting security priorities

Question 21.21.What is considered the first step in formulating a security policy? (Points : 4)

 risk analysis

 elimination of threats

 risk reduction

 system monitoring

Question 22.22.Which of the following best describes a Monte Carlo simulation? (Points : 4)

 a technique for simulating an attack on a system

 a formula that estimates the cost of countermeasures

 a procedural system that simulates a catastrophe

 an analytical method that simulates a real-life system for risk analysis

Question 23.23.Which of the following is a security-related reason for monitoring and evaluating network traffic? (Points : 4)

 to determine if your IDPS signatures are working well

 to create substantial data to analyze

 to optimize your router and switch protocols

 to see how many files employees download form the Internet

Question 24.24.Which of the following is NOT typically an aspect of a security event management program? (Points : 4)

 monitoring events

 managing IDPS firmware

 managing data from sensors

 managing change

Question 25.25.What should an outside auditing firm be asked to sign before conducting a security audit? (Points : 4)

 subpoena

 nondisclosure agreement

 search and seizure contract

 social engineering covenant

 

 

Available Answer
$ 24.00

[Solved] Saint COm530 quiz 3 module 8 (100% Answer)

  • This solution is not purchased yet.
  • Submitted On 02 Dec, 2017 09:14:39
Answer posted by
Online Tutor Profile
solution
Question Question 1.1.What should a company consider installing on the network perimeter to prevent direct connections between the internal network and the Internet to help protect its data warehouses and employee privacy? (Points : 4) router VPN server ICMP monitor proxy server Question 2.2.The Cisco PIX line of products is best described as which of the following? (Points : 4) software firewall PC with firewall installed firewall appliance VPN gateway Question 3.3.Which of the following is a typical drawback of a free firewall program? (Points : 4) cannot monitor traffic in real time oversimplified configuration have centralized management more expensive than hardware firewalls Question 4.4.Which of the following is an advantage of hardware firewalls? (Points : 4) not scalable compared to software firewalls not dependent on a conventional OS less expensive than software firewalls easy to patch Question 5.5.What are the two standard ports used by FTP along with their function? (Points : 4) UDP 23 control, TCP 20 data UDP 20 data, TCP 21 control TCP 21 control, TCP 20 data TCP 23 data, TCP 21 control Question 6.6.Which of the following is true about private IP addresses? (Points : 4) they are assigned by the IANA they are not routable on the Internet they are targeted by attackers NAT was designed to conserve them Question 7.7.Which ...
Buy now to view the complete solution
Other Similar Questions
User Profile
maste...

Saint com545 final exam

Question Question 1. Question : Which type of endpoint communication is not susceptible to malware (virus) infection? E-mail SMS message instant message/chat Internet browsing Pots Received: 1 of 1 Comments: Question 2. Quest...
User Profile
maste...

Saint COm530 quiz 3 module 8 (100% Answer)

Question Question 1.1.What should a company consider installing on the network perimeter to prevent direct connections between the internal network and the Internet to help protect its data warehouses and employee privacy? (P...
User Profile
maste...

Saint Com510 Midterm Exam 2017 (Perfect Answer)

Question Question 1 (5 points) The macro virus infects the key operating system files located in a computer’s start up sector. Question 1 options: True False Save Question 2 (5 points) Which function of InfoSec Management e...
User Profile
maste...

Saint Com203 Quiz 2 Latest 2016

Question Question 1. Question: In the computer industry, which term refers to the physical size and dimensions of a component? Bus Speed Clock Speed Form Factor Service Life Storage Capacity Question 2. Question : A processor...
User Profile
maste...

Saint COM530 module 2 quiz

Question 1.1. An activist can best be described as which of the following? (Points : 5) An unskilled programmer that spreads malicious scripts Consider themselves seekers of knowledge Use DoS attacks on websites with which th...

The benefits of buying study notes from CourseMerits

homeworkhelptime
Assurance Of Timely Delivery
We value your patience, and to ensure you always receive your homework help within the promised time, our dedicated team of tutors begins their work as soon as the request arrives.
tutoring
Best Price In The Market
All the services that are available on our page cost only a nominal amount of money. In fact, the prices are lower than the industry standards. You can always expect value for money from us.
tutorsupport
Uninterrupted 24/7 Support
Our customer support wing remains online 24x7 to provide you seamless assistance. Also, when you post a query or a request here, you can expect an immediate response from our side.
closebutton

$ 629.35