Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security Study Set 2
Quiz 6: Security Technology: Access Controls, Firewalls, and Vpns
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 101
Short Answer
A ____________________ mode VPN establishes two perimeter tunnel servers to encrypt all traffic that will traverse an unsecured network. The entire client packet is encrypted and added as the data portion of a packet addressed from one tunneling server to another.
Question 102
Short Answer
Simple Mail Transport Protocol (SMTP) data is allowed to pass through the firewall, but it should all be routed to a well-configured SMTP gateway to filter and route messaging traffic securely.
Question 103
Essay
When Web services are offered outside the firewall, HTTP traffic should be denied from reaching your internal networks through the use of some form of proxy access or DMZ architecture.
Question 104
Essay
All Internet Control Message Protocol (ICMP) data should be denied.
Question 105
Essay
All traffic from the trusted network is allowed out.
Question 106
Short Answer
Kerberos ticket granting service (TGS), which provides tickets to clients who request services. In Kerberos a ticket is an identification card for a particular client that verifies to the server that the client is requesting services and that the client is a valid member of the Kerberos system and therefore authorized to receive services. The ticket consists of the client's name and network address, a ticket validation starting and ending time, and the session key, all encrypted in the private key of the server from which the client is requesting services.
Question 107
Short Answer
A(n) ____________________ private network is a secure network connection between systems that uses the data communication capability of an unsecured and public network.
Question 108
Essay
List and describe the interacting services of the Kerberos system.
Question 109
Short Answer
SESAME uses ____________________ key encryption to distribute secret keys.
Question 110
Not Answered
Briefly describe the best practice rules for firewall use.
Question 111
Short Answer
A trusted VPN uses ____________________ circuits from a service provider who gives contractual assurance that no one else is allowed to use these circuits and that they are properly maintained and protected.