1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Discretionary access control is an organizational approach that specifies resource use based on the assignment of data classification schemes to resources and clearance levels to users.
a. True b. False
b. False
Accountability is the matching of an authenticated entity to a list of information assets and corresponding access levels.
a. True b. False
b. False
Packet-filtering firewalls scan network data packets looking for compliance or violations of the firewall's database rules.
a. True b. False
a. True
Good firewall rules include denying all data that is not verifiably authentic.
a. True b. False
a. True
A _____ filtering firewall can react to an emergent event and update or create rules to deal with the event.
a. stateless
b. static
c. stateful
d. dynamic
d. dynamic
The _____ is an intermediate area between a trusted network and an untrusted network.
a. DMZ
b. firewall
c. domain
d. perimeter
a. DMZ
In most common implementation models, the content filter has two components: _____.
a. filtering and encoding
b. allow and deny
c. rating and decryption
d. rating and filtering
d. rating and filtering
In _____ mode, the data within an IP packet is encrypted, but the header information is not.
a. transport
b. tunnel
c. public
d. symmetric
a. transport
Which of the following versions of TACACS is still in use?
a. TACACS v2
b. Extended TACACS
c. TACACS+
d. All of these are correct
c. TACACS+
The dominant architecture used to secure network access today is the _____ firewall.
a. static
b. screened subnet
c. unlimited
d. bastion
b. screened subnet