Quiz 11

11 September 2022
4.7 (114 reviews)
25 test answers

Unlock all answers in this set

Unlock answers (21)
question
Remote access policy
answer
Which of the following documents is an organization's rules for using a VPN? -Hairpinning -Remote access policy -Service level agreement -Vaporware
question
Client attack
answer
Which of the following is most likely to be a vulnerability in a VPN? -Denial of service attack -VPN server attack -Client attack -Remote access attack
question
A contractual commitment by a service provider or support organization to its customers or users
answer
Which of the following describes a service level agreement (SLA)? -A contractual commitment by a service provider or support organization to its customers or users -The ability for a network or system user to remain unknown -An industry term referring to any product that appears in a vendor's PowerPoint slide deck, but is not yet available in one of its products -A process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn and enter a secure network with little or no trouble because it is entering from a secure and verified endpoint
question
Vulnerability management
answer
Which of the following identifies, tracks, and mitigates known weaknesses on hosts or applications within a computing environment? -BYOD policies -Slideware -Vulnerability management -Hairpinning
question
Slideware
answer
Which of the following refers to any product that appears in a vendor's PowerPoint slide deck, but is not yet available in one of its products? -Anonymity -Hairpinning -Service level agreement (SLA) -Slideware
question
Compromising the authentication credentials
answer
Which of the following is one of the easiest ways to compromise a VPN? -Compromising VPN availability -Compromising the authentication credentials -Patching regularly -Using vulnerability management with remote clients
question
There may be a security issue.
answer
When employees have multiple concurrent connections, what might be happening to the VPN system? -There may be a software failure. -Employees may be trying to access the system from remote locations. -There may be a security issue. -There may be a hardware failure.
question
The prohibiting of split tunneling
answer
Which of the following should specifically be included in the organizations VPN solution? -The prohibiting of split tunneling -Encouraging shared VPN credentials -Types of VPN connections supported -How scalable the VPN is
question
Bypass architecture
answer
Which type of architecture deploys the VPN so that traffic to and from the VPN is not firewalled? -Internally connected architecture -Bypass architecture -DMZ architecture -Two factor architecture
question
Internally connected architecture
answer
Which type of architecture recognizes that the VPN is vulnerable to attack if placed directly in the Internet, and therefore places the Internet-facing VPN connection behind a firewall? -Two-factor architecture -Internally connected architecture -Bypass architecture -DMZ architecture
question
DMZ architecture
answer
Which type of architecture places a firewall in front of the VPN to protect it from Internet-based attacks as well as behind a firewall to protect the internal network? -Bi-lateral architecture -Two-prong approach -Two-factor architecture -DMZ architecture
question
Default password
answer
Which of the following is one of the most common and easily exploited vulnerabilities on any hardware network device? -Insecure default configuration -Misconfiguration by the installer -Undistributed authentication credentials -Default password
question
Anonymity
answer
Which of the following reflects the ability of a network or system user to remain unknown? -Flexibility -Anonymity -Security -Denial of service
question
Determining scope
answer
When determining the number of users affected by a VPN problem, which troubleshooting step is being performed? -Determining scope -Identifying the symptoms -Looking for changes -Calling the vendor
question
True
answer
Anonymity is the capability for a network or system user to remain unknown. True or False
question
True
answer
One of the most important steps in VPN troubleshooting is documenting processes and procedures. True or False
question
False
answer
The least common method for implementing a highly available VPN involves buying two VPN hardware units and configuring them as a highly available pair. True or False
question
True
answer
"Privacy" is considered keeping information about a network or system user from being disclosed to unauthorized people. True or False
question
False
answer
One of the primary benefits of an open source solution is access to vendor support. True or False
question
True
answer
In a denial of service attack, the attacker is trying to crash or overload the VPN. True or False
question
False
answer
Instability is not considered a potential threat associated with software VPNs. True or False
question
True
answer
VPN hardware can suffer from an unsecured default configuration or misconfiguration. True or False
question
True
answer
To mitigate the risk of security threats and breaches, all installers should be trained before installing the VPN. True or False
question
True
answer
When developing a deployment plan for the VPN, power, heating, and cooling requirements are generally covered in the VPN's technical specifications. True or False
question
True
answer
A VPN policy should address which authorization methods are permitted on the system. True or False