Essay on IS3220 Final Exam

691 WordsJan 6, 20153 Pages
IS3220 Final Exam Review 1. What can you detect by analyzing a data packet? Policy violations and possible network vulnerabilities 2. NetWitness Investigator works how? Real Time 3. What is used by TCP to establish a session between two systems? Three way handshake 4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections? TCP 5. Promiscuous mode is most commonly associated with_____________? NIC 6. What are the primary objectives of information security? CIA 7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________? Policy 8.…show more content…
Analyze both static and real-time data 23. What does an application-level proxy do? Examines Packet Payloads 24. What are some of the problems facing static filtering? Can’t hit random source ports 25. What type of firewall keeps track of state tables to sieve network traffic? Stateful 26. Where should firewall rules that explicitly deny traffic be placed? At the bottom 27. What is the most important practice associated with firewall logging? Review Firewall Logs Frequently 28. Which firewall limitation is typically characterized by a memory-based exploit? Buffer Overrun 29. Firewall enhancements are desirable in all situations and should be deployed at any cost. False 30. Which of the following characteristics is included in a reverse proxy? Caching and Authentication 31. What is a benefit of using VPNs? Establishes Remote Network Access 32. Which aspect of the VPN prevents others from eavesdropping and observation? Cryptographic Functions 33. What is an advantage of VPN tunnel mode? Encapsulates protocol headers and packet payloads 34. Which of the following characteristics of a software VPN makes it less advantageous than a hardware VPN? Open sourced clients can be complex to install 35. To develop an AUP, you need to __________. Baseline Rules 36. Uninstalling all unnecessary applications and services on a system is an example of which of the following? System hardening 37. 192.168.12.12/255.255.255.255 is an example of which of the

    More about Essay on IS3220 Final Exam

      Open Document