These are just unit review questions.
I
II
III
IV
I
II
III
IV
I
II
III
IV
Main sole administrative privileges on the firewall
Standardize, configure, back up, and otherwise the firewall
Maintain a single naming/configuration standard for boundary devices
Install patches or perform any upgrade provided by the AF Enterprise Network
Switches
Firewalls
Routers
Servers
Active IDS
Passive IDS
Hosted-based IDS
Network-based IDS
Active IDS
Passive IDS
Host-based IDS
Network-based IDS
Update IDS signatures periodically
Deploy one IDS for the entire network
Use a centralized management console for system management
Consider using either a network -based IDS or host-based IDS
Can analyze any encrypted data if it is decrypted before reaching the target host
Consumes resources on the host resides on and slows the device down
Monitors log files for inadvisable settings or passwords
Monitors traffic on the host which it is installed
Cannot analyze encrypted packets because it has no method for decrypting the data
Monitors log files for inadvisable settings or passwords
Monitors traffic on the network on which it is installed
Consumes very few network resources
Active IDS
Passive IDS
Host-based IDS
Network-based IDS
Active IDS
Passive IDS
Host-based IDS
Network-base IDS
0-1023
1024-23535
23536-49151
49152-65535
Is the act of sporadically scanning a computer's ports
Sends out a request to connect to any computer
Notes which ports responded to the scan
Is always malicious in nature
Strobe
Sweep
Stealth
Vanilla
Presentation
Transport
Network
Session
Air Force Network Integration Center (AFNIC)
Air Force Network Operations Center (AFNOSC)
Air Force Information, Services and Integration Directorate (SAF/XCIA)
Air Force Operations Commander (AFNetOps/CC)
Air Force Network Integration Center (AFNIC)
Air Force Network Operations Center (AFNOSC)
Air Force Information, Services and Integration Directorate (SAF/XCIA)
Air Force Operations Commander (AFNetOps/CC)
Private
Public
Secure
Unsecure
Use access control lists on SNMP agents to accept SNMP messages from all SNMP managers
Keep devices requiring SNMP together with those that do not through VLANs
Disable all SNMP devices/services if not required
Enable the set community strings if possible
WU_PingProPackage
SolarWinds
SNMPutil
Security Mapper (SMAP)
Snort
Open source security (OSSEC)
Host based security system (HBSS)
Intruder alert (ITA)
Snort
Automatic Security Incident Measurement (ASIM)
Enterprise Security Manager (ESM)
Internet Security Scanner (ISS)
Snort
Automatic Security Incident Measurement (ASIM)
Enterprise Security Manager (EDM)
Internet Security Scanner (ISS)
Firewalls
Information condition (INFOCON)
Security tools
Defense in depth
Firewalls
Internet Security Scanner
Security tools
Defense in depth
Consolidating your voice with your data using virtual local area network (VLAN)
Enabling access control lists (ACL) on firewalls, routers, an switches.
Deploying protection from dynamic host configuration protocol (DHCP) spoofing
Enabling port security access to only allow the required devices needed by the client.
Network-level
Application-level
Corporate/enterprise
Personal/small office home office (SOHO)
Network-level
Application-level
Corporate/enterprise
Personal/small office home office (SOHO)
Network-level
Application-level
Corporate/enterprise
Personal/small office home office (SOHO)
Sidewinder
Death Star
Blue Coat
Viper
Integrated network operation security center (INOSC)
Air Force network operating center (AFNOC)
Based-level
Major command (MAJCOM)
Control center
Admin console
Command center
Command-line interface (CLI)
Address Resolution Protocol (ARP)
Getroute
Ping host
Traceroute
Halt system
Power down system
Reboot to operational kernel
Shutdown to emergency maintenance mode
Halt system
Power down system
Reboot to operational kernel
Shutdown to emergency maintenance mode
A network stack
A security policy
A set of one or more interfaces
A particular installation of a firewall
Configure the shared cluster address
Specify or sending and receiving heartbeats
Handle the fastest network traffic on your appliance
Isolate the cluster address from the domain name server (DNS) and default routers
Domain name server (DNS)
Burbs
Proxies
Fast path sessions
Named
Cache-Only
Master/Primary
Slave/Secondary
Named
Cache-Only
Master/Primary
Slave/Secondary
Resource records
Point (PTR) records
Zone records
Root cache
Resource records
Pointer (PTR) records
Zone records
Root cache
NSlookup
Server
Yype
Dig
Named
Cache-Only
Master/Primary
Slave/Secondary
Split
Dual
Secure
Generic
Port Access Control (PACL)
Router Access Control List (RACL)
Virtual Local Area Network Access Control List (VACL)
Firewall Access Control List (FACL)
Air Force Network Operations Command (AFNetOps/CC)
Air Force Information Warfare Center/Information Operations Directorate (AFIWC/IO)
Air Force Network Operations Center (AFNOC)
23 Information Operations Squadron (IOS)
Air Force Network Operations Command (AFNetOps/CC)
Air Force Information Warfare Center/Information Operations Directorate (AFIWC/IO)
Air Force Network Operations Center (AFNOC)
23 Information Operations Squadron (IOS)
Intrusion detection
Packet-capture
Filters/triggers
Firewalls
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.