Chapter 6 Quiz

10 September 2022
4.7 (114 reviews)
55 test answers

Unlock all answers in this set

Unlock answers (51)
question
Discretionary access control is an approach whereby the organization specifies use of resources based on the assignment of data classification schemes to resources and clearance levels to users.
answer
False
question
​Task-based controls are associated with the assigned role a user performs in an organization, such as a position or temporary assignment like project manager.
answer
False
question
Authentication is the process of validating and verifying an unauthenticated entity's purported identity.
answer
True
question
​Accountability is the matching of an authenticated entity to a list of information assets and corresponding access levels.
answer
False
question
Firewalls can be categorized by processing mode, development era, or structure.
answer
True
question
A firewall cannot be deployed as a separate network containing a number of supporting devices.
answer
False
question
Packet-filtering firewalls scan network data packets looking for compliance with the rules of the firewall's database or violations of those rules.
answer
True
question
The ability of a router to restrict traffic to a specific service is an advanced capability and not considered a standard feature for most routers.
answer
False
question
The application layer proxy firewall is capable of functioning both as a firewall and an application layer proxy server.
answer
True
question
Using an application firewall means the associated Web server must be exposed to a higher level of risk by placing it in the DMZ.
answer
False
question
The DMZ can be a dedicated port on the firewall device linking a single bastion host.
answer
True
question
The screened subnet protects the DMZ systems and information from outside threats by providing a network with intermediate security, which means the network is less secure than the general-public networks but more secure than the internal network.
answer
False
question
Good policy and practice dictates that each firewall device, whether a filtering router, bastion host, or other firewall implementation, must have its own set of configuration rules.
answer
True
question
Syntax errors in firewall policies are usually difficult to identify.
answer
False
question
When Web services are offered outside the firewall, HTTP traffic should be blocked from internal networks through the use of some form of proxy access or DMZ architecture.
answer
True
question
Good firewall rules include denying all data that is not verifiably authentic.
answer
True
question
Some firewalls can filter packets by protocol name.
answer
True
question
It is important that e-mail traffic reach your e-mail server and only your e-mail server.
answer
True
question
A content filter, also known as a reverse firewall, is a network device that allows administrators to restrict access to external content from within a network.
answer
True
question
A content filter is essentially a set of scripts or programs that restricts user access to certain networking protocols and Internet locations.
answer
True
question
The RADIUS system decentralizes the responsibility for authenticating each user by validating the user's credentials on the NAS server.
answer
False
question
Even if Kerberos servers are subjected to denial-of-service attacks, a client can still request additional services.
answer
False
question
A VPN, used properly, allows use of the Internet as if it were a private network.
answer
True
question
Authentication is a mechanism whereby unverified entities who seek access to a resource provide a label by which they are known to the system. _________________________
answer
False
question
The false reject rate describes the number of legitimate users who are denied access because of a failure in the biometric device. _________________________
answer
True
question
One of the biggest challenges in the use of the trusted computer base (TCB) is the existence of explicit channels. _________________________
answer
False
question
In static filtering, configuration rules must be manually created, sequenced, and modified within the firewall. _________________________
answer
True
question
A routing table tracks the state and context of each packet in the conversation by recording which station sent what packet and when. _________________________
answer
False
question
The primary disadvantage of stateful packet inspection firewalls is the additional processing required to manage and verify packets against the state table. _________________________
answer
True
question
The static packet filtering firewall can react to an emergent event and update or create rules to deal with that event. _________________________
answer
False
question
Port Address Translation assigns non-routing local addresses to computer systems in the local area network and uses ISP-assigned addresses to communicate with the Internet on a one-to-one basis. _________________________
answer
False
question
When a bastion host approach is used, the host contains two NICs, forcing all traffic to go through the device. _________________________
answer
False
question
Firewalls operate by examining a data packet and performing a comparison with some predetermined logical rules. _________________________
answer
True
question
A(n) intranet ​is a segment of the DMZ where additional authentication and authorization controls are put into place to provide services that are not available to the general public. _________________________
answer
False
question
When Web services are offered outside the firewall, SMTP traffic should be blocked from internal networks through the use of some form of proxy access or DMZ architecture. _________________________
answer
False
question
Most firewalls use packet header information to determine whether a specific packet should be allowed to pass through or should be dropped. _________________________
answer
True
question
Best practices in firewall rule set configuration state that the firewall device never allows administrative access directly from the public network. _________________________
answer
True
question
Kerberos uses asymmetric key encryption to validate an individual user to various network resources. _________________________
answer
False
question
Secure VPNs use security protocols and encrypt traffic transmitted across unsecured public networks like the Internet. _________________________
answer
True
question
The popular use for tunnel mode VPNs is the end-to-end transport of encrypted data. _________________________
answer
False
question
The restrictions most commonly implemented in packet-filtering firewalls are based on __________.
answer
All of the above
question
A __________ filtering firewall can react to an emergent event and update or create rules to deal with the event.
answer
dynamic
question
__________ inspection firewalls keep track of each network connection between internal and external systems.
answer
Stateful
question
The application layer proxy firewall is also known as a(n) __________.
answer
application firewall
question
The proxy server is often placed in an unsecured area of the network or is placed in the __________ zone.
answer
demilitarized
question
The __________ is an intermediate area between a trusted network and an untrusted network.
answer
DMZ
question
__________ firewalls are designed to operate at the media access control sublayer of the data link layer of the OSI network model.
answer
MAC layer
question
Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the __________ host.
answer
sacrificial
question
The dominant architecture used to secure network access today is the __________ firewall.
answer
screened subnet
question
Known as the ping service, ICMP is a(n) __________ and should be ___________.
answer
common method for hacker reconnaissance, turned off to prevent snooping
question
In most common implementation models, the content filter has two components: __________.
answer
rating and filtering
question
Which of the following versions of TACACS is still in use?
answer
TACACS+
question
The service within Kerberos that generates and issues session keys is known as __________.
answer
KDC
question
Kerberos __________ provides tickets to clients who request services.
answer
TGS
question
The primary benefit of a VPN that uses _________ is that an intercepted packet reveals nothing about the true destination system.
answer
tunnel mode