Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Which of the following is a malicious software program distributed by a hacker to take control of a victim’s computers? |
Agent |
|
Which term describes the calculation of the total loss potential across a year for a given asset and a specific threat? |
Annualized loss expectancy (ALE) |
|
Which of the following refers to a form of encryption also known as point-to-point or host-to-host encryption? |
Transport mode encryption |
|
Which of the following describes an appliance firewall?
|
A hardened hardware firewall
|
|
Which of the following refers to a type of firewall that filters on a specific application’s content and session information? |
Application firewall |
|
Which term describes the cumulative value of an asset based on both tangible and intangible values? |
Asset value (AV) |
|
Which malicious software program is distributed by hackers to take control of victims’ computers? |
Bots |
|
Which of the following is not a consideration when placing firewalls on the network? |
Where hackers are located |
|
Which firewall has a network interface located in a unique network segment that allows for true isolation of the segments and forces the firewall to filter all traffic moving from one segment to another? |
Dual-homed firewall
|
|
Which of the following refers to a software firewall installed on a client or server? |
Host firewall |
|
Ingress and egress filtering can expand beyond protection against spoofing and include a variety of investigations on inbound and outbound traffic. Which of the following is not one of the ways ingress and egress filtering expand beyond protection against spoofing? |
Dynamic packet filtering |
|
Which term is used to describe a firewall that is implemented via software? |
Bump-in-the-stack |
|
Which of the following refers to a type of software product that is pre-compiled and whose source code is undisclosed? |
Closed source |
|
Which name is given to a form of filtering that focuses on traffic content? |
Content filtering
|
|
Which of the following describes dynamic packet filtering?
|
A process that automatically creates temporary filters. In most cases, the filters allow inbound responses to previous outbound requests.
|
|
A firewall is a filtering device that enforces network security policy and protects the network against external attacks. |
True |
|
An application firewall filters on a specific application’s content and session information; however, it cannot inspect traffic at any layer. |
False |
|
The term bastion host refers to a firewall positioned along the pathway of a potential attack. It serves as the first line of defense for the network. |
True |
|
Ingress filtering filters traffic as it attempts to enter a network, including spoofed addresses, malformed packets, unauthorized ports and protocols, and blocked destinations. |
True |
|
A closed source is a type of software product that is pre-compiled and whose source code is undisclosed. |
True |