What is a dmz and what is it used for

Assignment Help Accounting Basics
Reference no: EM13235804

Need Exam satisfied by Due Date

(TCO 5) SubSeven and Back Orifice are examples of what kind of malicious code? 
Virus
Hoax
Worm
Trojan

Question 2. 2. (TCO 5) What is best ensured through the use of encryption

 Accounting
Authentication
Authorization
Confidentiality

Question 3. 3. (TCO 5) All of the following techniques help secure IM communications except _____. 
running a corporate IM server
using a different user name
avoiding file transfers
using encryption

Question 4. 4. (TCO 6) What is not an advantage of decentralized management?
The decentralized model is highly flexible, as changes can be made whenever they are needed.
It does not require a dedicated set of personnel and resources.
Bureaucracy is reduced.
A more consistent approach is ensured, as everyone "does it the same way."

Question 5. 5. (TCO 6) A network administrator wants to be sure that, when users change their passwords, they do not reuse a previous password. What domain password policy will need to be configured? 
Enforce password history
Maximum password age
Minimum password age
Minimum password length

Question 6. 6. (TCO 6) Running Java applets from the Web on your system is considered _____. 
a security risk
not risky
somewhat secure
very secure

Question 7. 7. (TCO 6) Which is more secure? 
Common Gateway Interface (CGI)
Server-side scripting
Third-party scripting
All are equally secure.

Question 8. 8. (TCO 6) One way a user can feel confident that the code being downloaded is from a legitimate vendor and has not been modified is with the implementation of _____. 
SSL
Authenticode
SFTP
HTTPS

Question 9. 9. (TCO 6) SSMTP uses TCP port _____. 
25
110
465
456

Question 10. 10. (TCO 2) HTTPS uses TCP port _____.
433
443
344
434

Question 11. 11. (TCO 2) All of the following are characteristics of a strong password except when it _____.
contains numbers and letters
contains at least eight characters
contains an uncommon dictionary word
contains special characters, such as *%$#@

Question 12. 12. (TCO 8) Which law makes it illegal to develop, produce, and trade any device or mechanism designed to circumvent technological controls used in copy protection? 
The Sarbanes-Oxley Act
The Digital Millennium Copyright Act
The U.S. Digital Signatures Law
The Computer Fraud and Abuse Act

Question 13. 13. (TCO 4) Which of the following is not one of the three forms of trust models? 
Hybrid
Star
Peer-to-peer
Hierarchical

Question 14. 14. (TCO 4) Which of the following reasons is appropriate for a certificate suspension rather than for revocation? 
All the keys are compromised.
Changed affiliation
An extended vacation
The certificate is no longer needed, but no reason exists to suspect that it has been compromised.

Question 15. 15. (TCO 2) PGP uses _____.
private-key encryption
asymmetric encryption
symmetric encryption
anomalous encryption

Question 16. 16. (TCO 2) HTTPS uses port _____.
80
8080
443
433

Question 17. 17. (TCO 3) Which Transport Layer protocol is connection oriented?
UDP
TCP
IP
ICMP

Question 18. 18. (TCO 3) Which of the following is the term that indicates a hostile activity that does not match an IDS signature and, therefore, goes undetected? 
Detection failure
False alert
False negative
False positive

Question 19. 19. (TCO 3) Packet delivery to distant systems is usually accomplished by the use of _____.
MAC addresses
domain names
IP addresses
ARP protocol

Question 20. 20. (TCO 3) A network that lies completely inside the trusted area of a network and is under the security control of the system and network administrators is referred to as the _____. 
DMZ
Intranet
Extranet
Internet

Question 21. 21. (TCO 3) A logical implementation of a LAN that allows computers connected to different physical networks to act and communicate as if they are on the same physical network is referred to as a _____.
DMZ
VLAN
Extranet
Tunnel

Question 22. 22. (TCO 6) You are building a small network in an office. You need to connect two different network segments that have different network addresses. What device will you use to connect them? 
A hub
A router
A switch
A server

Question 23. 23. (TCO 6) A hub operates at _____. 
Layer 1, the Physical Layer
Layer 2, the Data Link Layer
Layer 2, the MAC Layer
Layer 3, the Network Layer

Question 24. 24. (TCO 6) What protocol is used to manage IP address space? 
ICMP
DHCP
TCP
SNMP

Question 25. 25. (TCO 6) Which type of access control would you use to grant permissions based on the sensitivity of the information contained in the objects?
Mandatory access control
Discretionary access control
Role-based access control
Rule-based access control

Write a password policy that your company will have to follow to ensure strong passwords.
Describe some of the types of attacks that can be launched against a network.
What is a DMZ, and what is it used for?
List three kinds of information contained in an IP packet header.
What laws protect the recording industry from digital piracy?
Describe the laws that govern digital signatures.
Explain some of the problems with PGP.
What are content- and context-based signatures? Which is best to use and why?
What are the four common methods for connecting equipment at the Physical Layer?
Evaluate the difference between a public CA and a private CA.
What is PII as it relates to privacy?
What are some Web-related privacy issues?
What is the importance of a baseline to change management?
What are the essential elements of change management?
What laws govern computer access and trespass? 

Reference no: EM13235804

Questions Cloud

Determine the ucl and lcl for the x-bar : Checkout time at a supermarket is monitored using a range and mean chart. Six samples which contain 20 observations per sample have been collected and the sample means and sample ranges have been computed as shown below.
Explain the net ionic equation to show the formation salt : Write the net ionic equation to show the formation of a precipitate (insoluble salt) when the following solutions are mixed. Write noreaction if no insoluble salt forms
How to make the down payment and the quarterly payments : An automobile is priced at $ 7,000. A buyer may purchase the car for $ 6,500 now, or alternatively, the buyer can make a down payment of $ 1,000 now and pay the remaining $ 6,000 in eight equal quarterly payments ( over 2 years)
What will make alternative2 equaly desirable to alternative1 : Your money is tied up and you need to borrow $ 10,000. The following two alternatives are being offered by the lender: ( 1) pay $ 3,288.91 at the end of each year for 5 years, starting at the end of the first year
What is a dmz and what is it used for : Write a password policy that your company will have to follow to ensure strong passwords.Describe some of the types of attacks that can be launched against a network.What is a DMZ, and what is it used for?
Analyze two of the four consequences of behavior : Analyze two of the four consequences of behavior, and illustrate an incidence where a combination of those two would occur together.
Find the number of theoretical stages : Perform a similar analysis of a stripping column. In this case, 100 lbmol/h of water with a concentration of 0.0045 lbmol SO2/ft3 is stripped with air to a concentration of 0.0005 lbmol SO2/ft3. The air flow rate is 1.5 times the minimum.
Find the level of newspaper and magazine advertising : Bounds Inc.has determined through regression analysis that its sales (S) are a function ofthe amount ofadvertising (measured in units) in two different media
Customers of an organization fall under : Customers of an organization fall under which of the following category?

Reviews

Write a Review

Accounting Basics Questions & Answers

  What type of fraud should be of interest to the auditor

Corporate fraud has become a hot topic in the accounting profession for the last several years. When conducting an audit, an auditor may encounter some corporate fraud.

  Treating transaction of schedule

Jerry, a general contractor by trade, is a tenant of Montgomery Apartments. In exchange for four months rent at $900 per month, Jerry provided the following items and services for Paul, the owner of the apartments: How should Paul treat this trans..

  Industries of selected securities

Recognize the industries of your six selected securities. (including BONDS)

  Ending accounts receivable balance

Assuming all sales were made on account, compute the ending accounts receivable balance that should appear in the ledger, noting any apparent shortage. Then, draft a memo dated October 3, 2010, to Mark Price, the branch manager, explaining the fac..

  Determin the consolidated net income

Without regard for this investment, Keefe earns $300,000 in net income during 2006. What is consolidated net income for 2006?

  Explain he circumstances that result different treatments

Explain and justify the difference between the treatment of estimated uncollectible taxes in fund accounting and the treatment of estimated bad debts in commercial accounting.

  Cash and securities comprising a sinking fund

The cash and securities comprising a sinking fund established to redeem bonds at maturity in 2015 should be classified on the balance sheet as:

  Total ordinary income and capital gain

During the year, $22,500 is distributed to Elk"s three equal shareholders, all of who are calendar year taxpayers. What are Elk"s total ordinary income and capital gain passthroughs for the year?

  Problem related to budgeted net income

The Adams Company, a merchandising firm, has budgeted its activity for November according to the following information: The budgeted net income for November is

  Account for investment in an acquired subsidiary

When a parent uses the initial value method throughout the year to account for its investment in an acquired subsidiary, which of the following statements is true before making adjustments on the consolidated worksheet?

  Basis in the noncash property

The distribution consists of $75,000 cash and property with an adjusted basis to the partnership of $20,000 and a fair market value of $25,000. Immediately before the distribution, Wendy's adjusted basis for her partnership interest is $90,000. We..

  What is their oversight role

Round-robin brainstorming can be a good technique. Let's say that we were going to incorporate this technique for a brainstorming session for a new client. You're in charge of creating the agenda and contacting the people who will attend the meeti..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd