• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

Which of the following is a malicious software program distributed by a hacker to take control of a victim’s computers?

Agent

Which term describes the calculation of the total loss potential across a year for a given asset and a specific threat?

Annualized loss expectancy (ALE)

Which of the following refers to a form of encryption also known as point-to-point or host-to-host encryption?

Transport mode encryption

Which of the following describes an appliance firewall?
A hardened hardware firewall

Which of the following refers to a type of firewall that filters on a specific application’s content and session information?

Application firewall

Which term describes the cumulative value of an asset based on both tangible and intangible values?

Asset value (AV)

Which malicious software program is distributed by hackers to take control of victims’ computers?

Bots

Which of the following is not a consideration when placing firewalls on the network?

Where hackers are located

Which firewall has a network interface located in a unique network segment that allows for true isolation of the segments and forces the firewall to filter all traffic moving from one segment to another?

Dual-homed firewall

Which of the following refers to a software firewall installed on a client or server?

Host firewall

Ingress and egress filtering can expand beyond protection against spoofing and include a variety of investigations on inbound and outbound traffic. Which of the following is not one of the ways ingress and egress filtering expand beyond protection against spoofing?

Dynamic packet filtering

Which term is used to describe a firewall that is implemented via software?

Bump-in-the-stack

Which of the following refers to a type of software product that is pre-compiled and whose source code is undisclosed?

Closed source

Which name is given to a form of filtering that focuses on traffic content?

Content filtering
Which of the following describes dynamic packet filtering?
A process that automatically creates temporary filters. In most cases, the filters allow inbound responses to previous outbound requests.

A firewall is a filtering device that enforces network security policy and protects the network against external attacks.

True

An application firewall filters on a specific application’s content and session information; however, it cannot inspect traffic at any layer.

False

The term bastion host refers to a firewall positioned along the pathway of a potential attack. It serves as the first line of defense for the network.

True

Ingress filtering filters traffic as it attempts to enter a network, including spoofed addresses, malformed packets, unauthorized ports and protocols, and blocked destinations.

True

A closed source is a type of software product that is pre-compiled and whose source code is undisclosed.

True