Correct Answer
verified
Multiple Choice
A) drop the attack packet(s)
B) limit suspicious traffic to a certain percentage of the total bandwidth
C) Both A and B
D) Neither A nor B
Correct Answer
verified
Multiple Choice
A) expensive
B) fairly safe in practice
C) Both A and B
D) Neither A nor B
Correct Answer
verified
Multiple Choice
A) Signature
B) Anomaly
C) Both A and B
D) Neither A nor B
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) good because it will prevent possible attack packets from entering the network
B) bad because valid, non-attack packets will be dropped and this will effectively created a self-generated DOS attack
C) Both A and B
D) Neither A nor B
Correct Answer
verified
Multiple Choice
A) inspecting packets for which there are good application proxy filtering rules
B) inspecting packets in isolation from their context
C) Both A and B
D) Neither A nor B
Correct Answer
verified
Multiple Choice
A) Signature
B) Anomaly
C) Both A and B
D) Neither A nor B
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Drop the packet unless it is permitted by an ACL
B) Pass the packet unless it is forbidden by an ACL
C) Pass the packet if it is part of a previously approved connection
D) Either A or B
Correct Answer
verified
Multiple Choice
A) suspicious packets
B) provable attack packets
C) Both A and B
D) Neither A nor B
Correct Answer
verified
Multiple Choice
A) zero-day
B) vulnerability based
C) stealth
D) anomaly based
Correct Answer
verified
Multiple Choice
A) stateful packet
B) static packet filtering
C) Both A and B
D) Neither A nor B
Correct Answer
verified
Multiple Choice
A) log the packet
B) drop the packet
C) Both A and B
D) Neither A nor B
Correct Answer
verified
Multiple Choice
A) Internet subnet
B) server subnet
C) external subnet
D) None of the above
Correct Answer
verified
Multiple Choice
A) as a secondary filtering mechanism on an application proxy firewall
B) on border routers
C) Both A and B
D) Neither A nor B
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) protocol fidelity
B) header destruction
C) Both A and B
D) Neither A nor B
Correct Answer
verified
Showing 41 - 60 of 100
Related Exams