Which port is used for hypertext transfer protocol (HTTP)?
What should security policies encompass to help mitigate the threat of...
Which port range constitutes well-known ports?
What should you do with unused ports?
An access control list (ACL) is essentially
The disadvantage of a host-based intrusion detection system (HIDS) is...
What is the function in which certain pieces of data from a web page...
Network security starts with
Which is not a common service?
What are attempts to gain access to a switch system by posing as an...
What provides protection of the base network perimeter using a...
Integration of the capabilities of personnel, operations, and...
How many Integrated Network and Operation Security Centers (INOSC)...
Which is not a primary focus of intrusion detection and prevention...
Which type of attack causes the connection queues on the router or...
A logical connection point for the transmission of information packets...
Which port is used for telnet?
What is used to import and manage phone numbers in the voice...
A domain name server (DNS) maintains the cross-reference between...
What is the default read community string of a simple network...
When the cached information is verified to be up-to-date, the proxy...
Host-based intrusion detection systems (HIDS) are
An active intrusion detection system (IDS) is normally incorporated...
When using an intrusion detection system (IDS), remember to
One advantage of a network-based intrusion detection system (NIDS) is...
Which firewall management interface menu option tests interface...
In which type of port scan does the scanner attempt to connect to all...
How many domain name server (DNS) name server(s) are registered as...
Which message type should not be allowed for inbound Internet control...
What can an attacker use to create a map of the protected network...
What does packet capture software do with the packet information it...
The McAfee Firewall Enterprise simple message transfer protocol (SMTP)...
At which open systems interconnect (OSI) layer does an...
The vulnerabilities of voice and data converged networks were...
Which type of scan is also known as a half open scan?
A burb can best be defined as a
To limit the risks associated with using simple network management...
Internet protocol (IP) filters start by blocking
Which is considered the workhorse of the Enterprise Security Manager...
What is the primary intrusion/misuse tool used in the Air Force...
What provides enterprise wide visibility into telecom resource...
Over what transmission control protocol (TCP) port do zone transfers...
Which type of firewall is typically used when speed is essential?
Which firewall management interface menu option views the association...
Why is it not common to use external burb-to internal burb?
When using secure split mail services, all external simple message...
What server functions as a simple message transfer protocol (SMTP)...
You can implement all of the following security features to help...
Proxies do not
What is the launch pad for voice protection system (VPS) applications?
Which firewall admin role is generally used to temporarily disable an...
Firewall policy processing compares specific attributes of a call...
Each time data needs to pass between the network and a proxy, the...
What term is used for a domain name server (DNS) architecture when one...
The uniqueness of the Air Force Microsoft Exchange and simple message...
How many hours prior to change implementation does the Integrated...
When a client connects to a proxy server and requests a web page, the...
One of the responsibilities of the Air Force Network Operations Center...
What does a firewall support that improves system performance by...
How many agents can an Intruder Alert (ITA) manager have?
Which is not one of the key features of Symantec Mail Security for...
What intrusion detection system (IDS) is not commonly used due to...
With which layer of the open systems interconnect (OSI) model does the...
Which tool is not used to test your simple network management protocol...
Which intrusion detection system (IDS) examines servers or client...
Which type of firewall views information as a data stream and not as a...
What type of proxy is located near the user/client and acts as an...
Which voice protection system (VPS) application allows you to view...
Community string passwords should be changed at least every
What does a forward zone provide?
Which is not an administrator role on the McAfee Firewall Enterprise?
At which open systems interconnect (OSI) layer does a packet filter...
External clients request content directly from which proxy type?
Most firewall implementations that you will encounter will be found at...
Which open source host-based intrusion detection system (HIDS)...
Who approves or disapproves information systems (including software...
What term is used to describe the technology for transmitting voice...
What severity code applies to any vulnerability that, when resolved,...
What voice protection system (VPS) component will only be installed on...
Which voice protection system (VPS) toolbar icon is used to open the...
The vulnerabilities detected by Internet security scanner (ISS) are...
By default, a system checks the mail queues for mail that cannot be...
Above which layer of the open systems interconnect (OSI) model are...
By default, how often does the intrusion prevention system (IPS)...
Which is not a software component of Intruder Alert (ITA)?
What serves as the Intruder Alert administrator (ITA) command center?
Which e-mail server relays all e-mail entering or exiting the local...
Which e-mail server delivers all outgoing e-mail to the mail relay...
What severity code applies to any vulnerability that provides...
What severity code applies to any vulnerability that provides...
Which intrusion detection system (IDS) monitors network traffic and...
Which is not a voice protection system (VPS) application or tool?
Which provides a call accounting, reporting analysis for enterprise...
In what layer of the open system interconnect (OSI) model is simple...
Which is not a separate sendmail server used in secure split simple...
Which is not listed in the performance manager tree-pane?
Which cannot be used to manage a McAfee Firewall Enterprise?
Which McAfee Firewall Enterprise management interface is the graphical...
Voice protection system (VPS) reports are generated from the VPS
Why should Internet security scanner (ISS) scans not be used on...