Computer Security Quiz 9

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

A packet filtering firewall is typically configured to filter packets going in both directions. T/F?

True

2
New cards

The countermeasure to tiny fragment attacks is to discard packets with an inside source address if the packet arrives on an external interface. T/F?

False

3
New cards

A traditional packet filter makes filtering decisions on an individual packet basis and does not take into consideration any higher layer context. T/F?

True

4
New cards

A logical location for implementing IPSec is in a firewall. T/F?

True

5
New cards

Distributed firewalls protect against internal attacks and provide protection tailored to specific machines and applications. T/F?

False

6
New cards

An important aspect of a distributed firewall configuration is security monitoring. T/F?

True

7
New cards

Unlike a firewall, an IPS does not block traffic. T/F?

False

8
New cards

A ____ gateway sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host.

Circuit-level

9
New cards

An example of a circuit-level gateway implementation is the ____ package.

SOCKS

10
New cards

Typically the systems in the ___ require or foster external connectivity such as a corporate Web site, an e-mail server, or a DNS server.

DMZ

11
New cards

A ___ consists of a set of computers that interconnect by means of a relatively unsecure network and makes use of encryption and special protocols to provide security.

VPN

12
New cards

A NIPS using ____ scans for attack signatures in the context of a traffic stream rather than individual packets.

Stateful matching

13
New cards

A NIPS using ____ looks for deviation from standards set forth in RFCs.

Protocol anomaly

14
New cards

The ___ attack is designed to circumvent filtering rules that depend on TCP header information.

Tiny fragment

15
New cards

A ___ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter to protect the premises network from Internet-based attacks.

firewall

16
New cards

The __ IP address is the IP address of the system that originated the IP packet.

source

17
New cards

A ____ firewall controls the traffic between a personal computer or workstation on one side and the Internet or enterprise network on the other side.

personal

18
New cards

Snort Inline adds three new rule types: drop, reject, and ___.

Sdrop

19
New cards

A single device that integrates a variety of approaches to dealing with network-based attacks is referred to as a ____ system.

UTM

20
New cards

The firewall follows the classic military doctrine of ___ because it provides an additional layer of defense.

defense in depth

Explore top flashcards