Type of firewall policy calls

Assignment Help Financial Accounting
Reference no: EM13914637

Question 1. An activist can best be described as which of the following?

  • An unskilled programmer that spreads malicious scripts
  • Consider themselves seekers of knowledge
  • Use DoS attacks on websites with which they disagree
  • Deface websites by leaving messages for their friends to read

Question 2. Which type of firewall policy calls for a firewall to deny all traffic by default?

  • Permissive policy
  • Perimeter policy
  • Restrictive policy
  • Demilitarized policy

Question 3. What is a program that appears to do something useful but is actually malware?

  • Virus
  • Logic bomb
  • Trojan
  • Back door

Question 4. In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?

  • Basic
  • Challenge/response
  • Biometrics
  • Signature

Question 5. Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?

  • Malicious port scanning
  • Man-in-the-middle
  • Denial of service
  • Remote procedure call

Question 6. How large is the IPv6 address space?

  • 32 bits
  • 128 bits
  • 64 bits
  • 168 bits

Question 7. Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped?

  • TTL
  • Fragment Offset
  • ECN
  • Options

Question 8.8.Which protocol is responsible for automatic assignment of IP addresses?

  • DNS
  • DHCP
  • FTP
  • SNMP

Question 9. Which of the following is not an advantage of IPv6 versus IPv4?

  • Larger address space
  • Built-in security
  • Supports static configuration
  • NAT is unnecessary

Question 10. Which of the following is a valid IPv6 address?

  • 5BA4:2391:0:0:4C3E
  • 1080::8:800:200C:417A
  • 24::5B1A::346C
  • 5510:ABCD::34:1::2

Question 11. Which TCP flag can be the default response to a probe on a closed port?

  • RST
  • URG
  • PSH
  • SYN

Question 12. Which of the following is the description of a land attack?

  • The local host source address occurs in the packet.
  • Source and destination IP address/port are the same.
  • An illegal TCP flag is found in the segment header.
  • The attacker uses an undefined protocol number.

Question 13. What is the typical packet sequence for closing a TCP session?

  • FIN, FIN ACK, RST
  • FIN, ACK, FIN ACK, ACK
  • FIN ACK, FIN, ACK, RST
  • FIN, FIN ACK

Question 14. Which of the following is an element of the TCP header that can indicate that a connection has been established?

  • Flags
  • Stream index
  • SEQ/ACK analysis
  • Sequence number

Question 15. Of what category of attack is a DoS attack an example?

  • Bad header information
  • Single-packet attack
  • Multiple-packet attack
  • Suspicious data payload

Question 16. What uses mathematical calculations to compare routes based on some measurement of distance?

  • Route summarization
  • Link-state routing protocols
  • Routing metrics
  • Distance-vector routing protocols

Question 17. Which protocol that runs on Cisco routers shares information between Cisco devices?

  • CDP
  • TCP
  • bootp
  • SSH

Question 18. Which of the following is true about ACLs on Cisco routers?

  • There is an implicit deny any statement at the end of the ACL.
  • There is an explicit permit any statement at the beginning of the ACL.
  • ACLs are processed in reverse order so place high priority statements last.
  • ACLs bound to an interface apply to inbound and outbound traffic by default.

Question 19.19.Which of the following types of traffic does NOT travel through routers?

  • DNS zone transfers
  • ARP requests
  • SNMP status information
  • Network route information

Question 20. Which of the following types of passwords prevents a user from accessing privileged exec mode on a Cisco router?

  • Console
  • AUX
  • Enable
  • TTY

Reference no: EM13914637

Questions Cloud

Identifying hazardous air pollutants prior to 1990 amendment : Using the efficiency criterion, carefully analyze the problem faced by the EPA in identifying haz- ardous air pollutants prior to the 1990 Amendments.
Data in the table. : Which company is which? Explain how you identified each company from the data in the table.
Indicate whether each of the following accounts : Indicate whether each of the following accounts normally has a debit or credit balance: Interest Receivable, Interest Revenue, Dividends
What is the probability of drawing a diamond card : What is the probability (written as a percent) of drawing a Diamond card? What is the probability (written as a proportion) of drawing a face card
Type of firewall policy calls : Which type of firewall policy calls for a firewall to deny all traffic by default?
Difference between systems analysis and systems design : Illustrate the difference between systems analysis and systems design. What is the goal of each phase? What are the ramifications of finding flaws during the analysis phase or the design phase?
Prepare journal entries to record the issue of bond by angel : Prepare journal entries to record the issue of the bonds by Angel on April 1, 2014, and the first two interest payments on October 1, 2014, and April 1, 2015.
Identify each event as asset source : Identify each event as asset source (AS), asset use (AU), asset exchange (AE), or claims exchange (CE). Also identify the account to be debited and the account to be credited when the transaction is recorded.
Record each of the preceding events : Collected $24,000 of cash in advance for services to be provided over the next 12 months.

Reviews

Write a Review

Financial Accounting Questions & Answers

  Discuss the general and specific risks facing the yaslike

Identify and discuss the general and specific risks facing the Yaslike Ltd group from a treasury perspective. Your discussion should include the potential treasury risks associated with obtaining a loan from Wolfgang Engineering GmbH.

  Log transformation when points do not seem to follow a

log transformation when points do not seem to follow a straight line.speculate what you think we might have to do for

  Comparison of mutually exclusive projects based on eac amp

comparison of mutually exclusive projects based on eac amp npv.eads industrial systems company eisc is trying to decide

  Margin of safety percentage-break-even point

James Company has a margin of safety percentage of 20%. The break-even point is $220,000 and the variable costs are 40% of sales. Given this information, the operating profit is:

  What is the change in annual operating income

What is the change in annual operating income from discontinuing the talking dog product line?

  How can analysis tools help the finance or accounting arms

Do the tools help only in certain situations such as routine, daily or rather mundane decisions, like cost controls, quality controls or staffing questions (in term of number of people needed)?

  Prepare journal entries under the perpetual inventory system

Sunita Computer Supplies entered into the following transactions. Prepare journal entries under the perpetual inventory system.

  Additional easement area

What concept is illustrated if the additional easement area is acquired and What is the indicated value of the residential density (expressed on a Price per Far basis) in this market?

  Calculate the amount of bad debt expense

Calculate the amount recorded by A&E as Insurance Expense in 2012 and what amount should A&E report as total infrequent net gains/losses that are considered extraordinary - calculate the amount of bad debt expense recorded by A&E in 2012.

  Prepare a statement of revenues and expenses

Prepare a statement of revenues and expenses and a statement of changes in net assets for Wise Owls for 20X1.

  Question absorption costing versus variable costing the

question absorption costing versus variable costing. the mavis company uses an absorption-costing system based on

  Prepare the entry to record depreciation

2010 was originally estimated to have a life of 8 years with a salvage value of $4,000 at the end of that time. Depreciation has been entered for 5 years on this basis. In 2015, it is determined that the total est. - mated life should be 10 years wit..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd