3D053 Cyber Surety Volume 2 Information Protection - Boundary Control Journeyman

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Bmx41992
B
Bmx41992
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,426
| Attempts: 263
SettingsSettings
Please wait...
  • 1/70 Questions

    (203) The disadvantage of a network-based intrusion detection system (NIDS) is that it

    • Cannot analyze encrypted packets because it has no method for decrypting the data.
    • Monitors log files for inadvisable settings or passwords.
    • Monitors traffic on the network on which it is installed.
    • Consumes very few network resources.
Please wait...
CDC Quizzes & Trivia
About This Quiz

CDC 3D053 Cyber Surety Volume 2. Information Protection - Boundary Control Journeyman URE's


Quiz Preview

  • 2. 

    (204) Which port range constitutes well-known ports?

    • 0–1023.

    • 1024–23535.

    • 23536–49151.

    • 49152–65535.

    Correct Answer
    A. 0–1023.
    Explanation
    Well-known ports are the port numbers that are commonly used by protocols and services. These ports range from 0 to 1023. These ports are assigned by the Internet Assigned Numbers Authority (IANA) and are reserved for specific purposes. They include ports for commonly used protocols such as HTTP (port 80), FTP (port 21), and SSH (port 22). The other port ranges mentioned in the options are not considered well-known ports.

    Rate this question:

  • 3. 

    (203) The disadvantage of a host-based intrusion detection system (HIDS) is that it

    • Can analyze any encrypted data if it is decrypted before reaching the target host.

    • Consumes resources on the host it resides on and slows that device down.

    • Monitors log files for inadvisable settings or passwords.

    • Monitors traffic on the host on which it is installed.

    Correct Answer
    A. Consumes resources on the host it resides on and slows that device down.
    Explanation
    A host-based intrusion detection system (HIDS) consumes resources on the host it resides on and slows that device down. This means that the HIDS uses processing power, memory, and other system resources, which can impact the overall performance of the host. As a result, the host may experience slower response times and decreased efficiency.

    Rate this question:

  • 4. 

    (207) Integration of the capabilities of personnel, operations, and technology, and the evolution to network centric warfare best describes what concept?

    • Firewalls.

    • Information condition (INFOCON).

    • Security tools.

    • Defense in depth.

    Correct Answer
    A. Defense in depth.
    Explanation
    The concept described in the question is the integration of personnel, operations, and technology, and the evolution to network centric warfare. This concept is best known as defense in depth. Defense in depth refers to the strategy of implementing multiple layers of security measures to protect a system or network. It involves a combination of physical, technical, and administrative controls to ensure the overall security and resilience of the system.

    Rate this question:

  • 5. 

    (209) Which firewall management interface menu option views the association between MAC addresses on the firewall and its corresponding internet protocol (IP) address?

    • Address Resolution Protocol (ARP).

    • Getroute.

    • Ping host.

    • Traceroute.

    Correct Answer
    A. Address Resolution Protocol (ARP).
    Explanation
    The correct answer is Address Resolution Protocol (ARP). ARP is a protocol used to map an IP address to a physical (MAC) address on a local network. In the context of a firewall, the management interface menu option that views the association between MAC addresses and IP addresses would likely be related to ARP. This option would allow administrators to see the mapping between the two addresses, which is important for network troubleshooting and security management.

    Rate this question:

  • 6. 

    (205) To limit the risks associated with using simple network management protocol (SNMP),

    • Use access control lists on SNMP agents to accept SNMP messages from all SNMP managers.

    • Keep devices requiring SNMP together with those that do not through VLANs.

    • Disable all SNMP devices/services if not required.

    • Enable the set community strings if possible.

    Correct Answer
    A. Disable all SNMP devices/services if not required.
    Explanation
    The correct answer is to disable all SNMP devices/services if not required. This is because by disabling SNMP devices/services that are not needed, the risks associated with using SNMP can be minimized. This reduces the potential attack surface and limits the potential for unauthorized access or exploitation of SNMP vulnerabilities.

    Rate this question:

  • 7. 

    (205) What is the default read community string of a simple network management protocol (SNMP) agent?

    • Private.

    • Public.

    • Secure.

    • Unsecure.

    Correct Answer
    A. Public.
    Explanation
    The default read community string of a Simple Network Management Protocol (SNMP) agent is "Public." This community string is used to authenticate and control access to the SNMP agent for read-only operations. It allows users to retrieve information from the agent, such as network statistics and device configurations. However, it is recommended to change the default community string to a more secure and unique one to prevent unauthorized access to the SNMP agent.

    Rate this question:

  • 8. 

    (213) While monitoring your network, a guideline you should remember is to

    • Observe regular network traffic and look for anomalies

    • Review logs and network statistics at least annually.

    • Set triggers for unique intrusions.

    • Use a single master intrusion detection system (IDS) product

    Correct Answer
    A. Observe regular network traffic and look for anomalies
    Explanation
    The correct answer is to observe regular network traffic and look for anomalies. This guideline is important because it allows you to identify any unusual or suspicious activity on your network. By regularly monitoring network traffic, you can detect potential security breaches or unauthorized access attempts. Anomalies in network traffic can indicate the presence of malware, intrusions, or other security threats. Therefore, it is crucial to continuously observe network traffic and investigate any anomalies to ensure the security and integrity of your network.

    Rate this question:

  • 9. 

    (208) What was the previous name for what is now called the McAfee Firewall Enterprise?

    • Sidewinder.

    • Death Star.

    • Blue Coat.

    • Viper.

    Correct Answer
    A. Sidewinder.
    Explanation
    The previous name for what is now called the McAfee Firewall Enterprise was Sidewinder.

    Rate this question:

  • 10. 

    (216) When using secure split mail services, all external simple message transfer protocol (SMTP) hosts will connect to the firewall’s

    • Local server.

    • Non-Internet server.

    • Internal sendmail server.

    • External sendmail server

    Correct Answer
    A. External sendmail server
    Explanation
    When using secure split mail services, all external simple message transfer protocol (SMTP) hosts will connect to the external sendmail server. This means that any external SMTP hosts, which are responsible for sending and receiving emails, will establish a connection with the external sendmail server. This server acts as a bridge between the external hosts and the internal network, ensuring the secure transfer of emails.

    Rate this question:

  • 11. 

    (207) Restricting what traffic travels in and out of the network best describes what concept?

    • Firewalls.

    • Internet Security Scanner (INFOCON).

    • Security tools.

    • Defense in depth.

    Correct Answer
    A. Firewalls.
    Explanation
    The concept being described in the question is the restriction of traffic in and out of the network, which is best achieved through the use of firewalls. Firewalls act as a barrier between a trusted internal network and an untrusted external network, controlling the flow of traffic based on predetermined security rules. By filtering and monitoring network traffic, firewalls help to prevent unauthorized access and protect against potential threats and attacks.

    Rate this question:

  • 12. 

    (209) A firewall burb can best be defined as

    • A network stack.

    • A security policy.

    • A set of one or more interfaces.

    • A particular installation of a firewall.

    Correct Answer
    A. A set of one or more interfaces.
    Explanation
    A firewall burb can best be defined as a set of one or more interfaces. This means that a firewall burb represents the network interfaces that are connected to the firewall. These interfaces can be physical or virtual and are used to control the flow of network traffic, allowing or blocking certain connections based on predefined security policies. The term "burb" is derived from the word "suburb" and is used metaphorically to describe the different areas or zones within a network that the firewall interfaces are connected to.

    Rate this question:

  • 13. 

    (217) Messages that are sent to the person administering a mail system are generally addressed to

    • Domain.admin.

    • Administrator.

    • Postmaster.

    • Mail-host

    Correct Answer
    A. Postmaster.
    Explanation
    When messages are sent to the person administering a mail system, they are generally addressed to the postmaster. The postmaster is responsible for managing and overseeing the mail system, including handling any issues or inquiries related to the system. This address is commonly used for administrative purposes and to report any problems or concerns with the mail system.

    Rate this question:

  • 14. 

    (218) When the cached information is verified to be up-to-date, the proxy has ensured information?

    • Currency.

    • Freshness.

    • Timeliness.

    • Authenticity.

    Correct Answer
    A. Freshness.
    Explanation
    Freshness refers to the state of being up-to-date or recently updated. In this context, when the cached information is verified to be up-to-date, it means that the proxy has ensured that the information is fresh or recently updated. This suggests that the proxy has taken measures to ensure that the cached information is current and reflects the most recent data available.

    Rate this question:

  • 15. 

    (224) Voice Protection System (VPS) reports provides a full-service reporting package that enables you to do all the following except

    • View telecom resource use.

    • Track phone network usage.

    • Provide conversation transcripts.

    • Report on service performance and call quality.

    Correct Answer
    A. Provide conversation transcripts.
    Explanation
    The Voice Protection System (VPS) reports offer a comprehensive reporting package that allows users to view telecom resource use, track phone network usage, and report on service performance and call quality. However, it does not provide conversation transcripts.

    Rate this question:

  • 16. 

    (211) Which access control list (ACL) restricts packets into or out of a given layer 3 interface?

    • Port Access Control List (PACL).

    • Router Access Control List (RACL).

    • Virtual Local Area Network Access Control List (VACL).

    • Firewall Access Control List (FACL).

    Correct Answer
    A. Router Access Control List (RACL).
    Explanation
    A Router Access Control List (RACL) is used to restrict packets into or out of a given layer 3 interface. It allows the router to filter traffic based on various criteria such as source/destination IP address, protocol, port number, etc. This helps in controlling network traffic and securing the network by allowing or denying specific types of traffic.

    Rate this question:

  • 17. 

    (220) Who owns the Enterprise Telephony Management system?

    • Unix.

    • McAfee.

    • Microsoft.

    • SecureLogix.

    Correct Answer
    A. SecureLogix.
    Explanation
    SecureLogix owns the Enterprise Telephony Management system.

    Rate this question:

  • 18. 

    (202) Active intrusion detection system (IDS) blocks network traffic when it detects an intrusion. Normally, active IDSs are incorporated into

    • Switches.

    • Firewalls.

    • Routers.

    • Servers.

    Correct Answer
    A. Firewalls.
    Explanation
    Active intrusion detection systems (IDS) are designed to actively block network traffic when they detect an intrusion. These systems are typically incorporated into firewalls, which act as a barrier between a trusted internal network and an untrusted external network. Firewalls are responsible for monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By incorporating active IDS into firewalls, organizations can enhance their network security by automatically blocking any suspicious or malicious traffic that may indicate an intrusion attempt. Therefore, firewalls are the most suitable option for housing active IDS.

    Rate this question:

  • 19. 

    (204) Above which layer of the open systems integration (OSI) model are protocols designed to reside?

    • Presentation.

    • Transport.

    • Network.

    • Session.

    Correct Answer
    A. Session.
    Explanation
    Protocols designed to reside above the session layer of the OSI model are responsible for managing the communication sessions between applications. The session layer is responsible for establishing, maintaining, and terminating connections between applications. It provides services such as session establishment, data synchronization, and session recovery. Therefore, protocols designed to reside above this layer would be responsible for managing these session-related tasks and ensuring efficient and reliable communication between applications.

    Rate this question:

  • 20. 

    (210) What term is used for a domain name server (DNS) architecture when one or more name servers reside behind a firewall, and contain an “inside” hostname and IP address?

    • Split.

    • Dual.

    • Secure.

    • Generic.

    Correct Answer
    A. Split.
    Explanation
    Split is the correct answer because in a split DNS architecture, there are two sets of DNS servers - one set is located inside the firewall and is used for internal network users, while the other set is located outside the firewall and is used for external network users. The inside DNS servers contain the "inside" hostname and IP address, while the outside DNS servers contain the public hostname and IP address. This allows for better security and control over DNS resolution for both internal and external users.

    Rate this question:

  • 21. 

    (208) The use of two or more network interface cards (NIC) best describes which type of firewall?

    • Network-level.

    • Application-Level.

    • Corporate/enterprise.

    • Personal/Small Office Home Office (SOHO).

    Correct Answer
    A. Corporate/enterprise.
    Explanation
    The use of two or more network interface cards (NIC) is commonly found in corporate/enterprise firewalls. This configuration allows for increased network throughput and redundancy. By having multiple NICs, the firewall can handle high volumes of network traffic and distribute the load across the interfaces. This is especially important in large organizations where there is a high demand for network services and the need for reliable and efficient network security measures.

    Rate this question:

  • 22. 

    (201) The integrated network operations and security centers (INOSC) has several responsibilities except

    • Maintain sole administrative privileges on the firewall.

    • Standardize, configure, back up, and otherwise maintain the firewall.

    • Maintain a single naming/configuration standard for boundary devices.

    • Install patches or perform any upgrades provided by AF Enterprise Network.

    Correct Answer
    A. Install patches or perform any upgrades provided by AF Enterprise Network.
    Explanation
    The integrated network operations and security centers (INOSC) have several responsibilities, including maintaining sole administrative privileges on the firewall, standardizing, configuring, backing up, and otherwise maintaining the firewall, and maintaining a single naming/configuration standard for boundary devices. However, the INOSC is not responsible for installing patches or performing any upgrades provided by AF Enterprise Network.

    Rate this question:

  • 23. 

    (204) In which type of port scan does the scanner connect to the same port on more than one

    • Strobe.

    • Sweep.

    • Stealth.

    • Vanilla.

    Correct Answer
    A. Sweep.
    Explanation
    A sweep port scan is a type of port scan where the scanner connects to the same port on multiple IP addresses. This scan is used to gather information about a range of IP addresses and the services running on them. Unlike a strobe port scan, which scans a single IP address, a sweep port scan allows the scanner to quickly scan a large number of IP addresses for open ports. A stealth port scan is designed to be undetectable, while a vanilla port scan is a basic and straightforward scan without any advanced techniques.

    Rate this question:

  • 24. 

    (205) Which tool is not used to test your simple network management protocol (SNMP) security?

    • WU_PingProPack.

    • SolarWinds.

    • SNMPutil.

    • Security mapper (SMAP).

    Correct Answer
    A. Security mapper (SMAP).
    Explanation
    Security mapper (SMAP) is not used to test SNMP security. SMAP is a tool used for network mapping and vulnerability scanning, but it does not specifically focus on testing SNMP security. WU_PingProPack, SolarWinds, and SNMPutil are all tools commonly used for testing and monitoring SNMP security.

    Rate this question:

  • 25. 

    (210) Which server is the only one that should have changes to domain name server (DNS) data?

    • Named.

    • Cache-Only

    • Master/Primary.

    • Slave/Secondary.

    Correct Answer
    A. Master/Primary.
    Explanation
    The correct answer is Master/Primary. The Master/Primary server is the only server that should have changes to domain name server (DNS) data. This server is responsible for managing and making updates to the DNS records and distributing them to the Slave/Secondary servers. The Slave/Secondary servers, on the other hand, are designed to replicate the DNS data from the Master/Primary server and serve as backups in case the Master/Primary server becomes unavailable. The Cache-Only server is not involved in making changes to DNS data, it only caches and resolves DNS queries.

    Rate this question:

  • 26. 

    (204) Port scanning

    • Is the act of sporadically scanning a computer’s ports.

    • Sends out a request to connect to any computer.

    • Notes which ports responded to the scan.

    • Is always malicious in nature.

    Correct Answer
    A. Notes which ports responded to the scan.
    Explanation
    Port scanning is the process of systematically scanning a computer's ports to determine which ones are open and responsive. It involves sending requests to connect to various ports and noting the ones that respond to the scan. This activity is not necessarily malicious in nature and can be conducted for legitimate purposes such as network security testing or troubleshooting.

    Rate this question:

  • 27. 

    (210) For which Berkeley Internet Name Domain (BIND) server type can there be as many servers as needed in a domain?

    • Named.

    • Cache-Only.

    • Master/Primary.

    • Slave/Secondary.

    Correct Answer
    A. Slave/Secondary.
    Explanation
    For the Berkeley Internet Name Domain (BIND) server type, there can be as many Slave/Secondary servers as needed in a domain. This server type is responsible for replicating and synchronizing data from the Master/Primary server, allowing for redundancy and load balancing in the domain.

    Rate this question:

  • 28. 

    You can implement all of the following security features to help define our internet protocol (IP) telephony systems from attackers except

    • Consolidating your voice with your data using virtual local area networks (VLAN).

    • Enabling access control lists (ACL) on firewalls, routers, and switches.

    • Deploying protection from dynamic host configuration protocol (DHCP) spoofing.

    • Enabling port security access to only allow the required devices needed by the client.

    Correct Answer
    A. Consolidating your voice with your data using virtual local area networks (VLAN).
    Explanation
    The correct answer is consolidating your voice with your data using virtual local area networks (VLAN). This is because VLANs are used to separate and prioritize network traffic, but they do not provide any specific security features to protect against attackers. The other options, such as enabling access control lists (ACL), deploying protection from DHCP spoofing, and enabling port security access, are all security features that can help protect IP telephony systems from attackers.

    Rate this question:

  • 29. 

    (208) Which type of firewall is typically used when speed is essential?

    • Network-level.

    • Application-level.

    • Corporate/enterprise.

    • Personal/Small Office Home Office (SOHO).

    Correct Answer
    A. Network-level.
    Explanation
    Network-level firewalls are typically used when speed is essential because they operate at the network layer of the OSI model, allowing them to quickly filter and process large amounts of network traffic. These firewalls are designed to examine the source and destination IP addresses, ports, and protocols of network packets, making decisions based on this information. This allows for efficient and fast filtering of network traffic, making network-level firewalls suitable for high-speed environments where speed is a priority.

    Rate this question:

  • 30. 

    (209) What does a firewall support that improves system performance by lessening the load placed on the system kernel?

    • Domain name server (DNS).

    • Burbs.

    • Proxies.

    • Fast Path sessions.

    Correct Answer
    A. Fast Path sessions.
    Explanation
    Fast Path sessions support improves system performance by lessening the load placed on the system kernel. Firewalls with Fast Path sessions are able to offload certain tasks from the system kernel, allowing it to focus on more critical functions. This can result in improved overall system performance and efficiency.

    Rate this question:

  • 31. 

    (210) Which flexible command line can be used to gather information from domain name servers (DNS)?

    • Nslookup.

    • Server.

    • Yype.

    • Dig.

    Correct Answer
    A. Dig.
    Explanation
    Dig is a flexible command line tool that can be used to gather information from domain name servers (DNS). It is commonly used for querying DNS records, performing DNS lookups, and troubleshooting DNS issues. Dig provides detailed information about DNS responses, including the authoritative name servers, TTL values, and DNSSEC validation status. It allows users to specify the DNS server they want to query and supports various query types, such as A, MX, NS, and TXT records. Overall, Dig is a powerful tool for gathering DNS information and is widely used by network administrators and DNS operators.

    Rate this question:

  • 32. 

    (202) When using an intrusion detection system (IDS), remember to

    • Update IDS signatures periodically.

    • Deploy one IDS for the entire network.

    • Use a centralized management console for system management.

    • Consider using either a network-based IDS or host-based IDS.

    Correct Answer
    A. Use a centralized management console for system management.
    Explanation
    Using a centralized management console for system management is important when using an intrusion detection system (IDS) because it allows for easier and more efficient management of the IDS. With a centralized management console, administrators can monitor and configure the IDS from a single location, making it easier to track and respond to potential threats. Additionally, a centralized management console allows for better coordination and collaboration among security teams, ensuring that any detected intrusions are addressed promptly and effectively.

    Rate this question:

  • 33. 

    (210) Which Berkeley Internet Name Domain (BIND) system file provide reverse mapping?

    • Resource records.

    • Pointer (PTR) records.

    • Zone records

    • Root cache

    Correct Answer
    A. Pointer (PTR) records.
    Explanation
    The correct answer is "Pointer (PTR) records." In the Berkeley Internet Name Domain (BIND) system, the PTR records are used for reverse mapping. These records map IP addresses to domain names, allowing reverse lookups to be performed. This is useful in situations where you have an IP address and need to determine the corresponding domain name.

    Rate this question:

  • 34. 

    (201) What severity code applies to any vulnerability that, when resolved, will prevent the possibility of degraded security?

    • I

    • II

    • III

    • IV

    Correct Answer
    A. IV
    Explanation
    Severity code IV applies to any vulnerability that, when resolved, will prevent the possibility of degraded security. This means that resolving the vulnerability will completely eliminate the risk or threat to the security of the system or network. Severity code IV indicates the highest level of severity, as it represents vulnerabilities that have the potential to cause significant harm or compromise the security of the system if left unaddressed.

    Rate this question:

  • 35. 

    (206) Which network-based security tool is a hardware and software system that sits on AF networks “listening” for “suspicious activity” that is characteristic of intruder techniques?

    • Snort.

    • Automatic Security Incident Measurement (ASIM).

    • Enterprise Security Manager (ESM).

    • Internet Security Scanner (ISS).

    Correct Answer
    A. Automatic Security Incident Measurement (ASIM).
  • 36. 

    (209) Which McAfee Firewall Enterprise management interface is the graphical software that runs a Windows computer within your network?

    • Control center.

    • Admin console.

    • Command center.

    • Command-line interface (CLI).

    Correct Answer
    A. Admin console.
    Explanation
    The McAfee Firewall Enterprise management interface that runs on a Windows computer within your network is called the Admin console. This graphical software allows you to manage and configure the firewall settings and policies. The Admin console provides a user-friendly interface for administrators to monitor and control the firewall's operations effectively.

    Rate this question:

  • 37. 

    (209) What is the default firewall shutdown option?

    • Halt system.

    • Power down system.

    • Reboot to operational kernel.

    • Shutdown to emergency maintenance mode.

    Correct Answer
    A. Reboot to operational kernel.
    Explanation
    The default firewall shutdown option is to reboot to the operational kernel. This means that when the firewall is shut down, it will automatically reboot and start up using the operational kernel. This option allows for a smooth transition and ensures that the firewall is ready to operate again after the shutdown.

    Rate this question:

  • 38. 

    (220) The vulnerabilities of voice and data converged networks were highlighted in a report released by the

    • President’s National Security Telecommunications Advisory Committee

    • Air Force Information Warfare Battlelab

    • Air Force Network Integration Center

    • Cryptographic Systems Group

    Correct Answer
    A. President’s National Security Telecommunications Advisory Committee
    Explanation
    The correct answer is the President’s National Security Telecommunications Advisory Committee. The explanation is that the vulnerabilities of voice and data converged networks were highlighted in a report released by this committee.

    Rate this question:

  • 39. 

    (203) Which intrusion detection system (IDS) uses software sensors?

    • Active IDS.

    • Passive IDS.

    • Host-based IDS.

    • Network-based IDS.

    Correct Answer
    A. Host-based IDS.
    Explanation
    A host-based intrusion detection system (IDS) uses software sensors to monitor and analyze activities happening on a single host or computer system. It focuses on detecting suspicious behavior or unauthorized activities that may occur within the host's operating system, applications, or files. This type of IDS is installed directly on the host and can provide detailed information about the activities happening on that specific host, making it an effective tool for detecting and responding to intrusions at the host level.

    Rate this question:

  • 40. 

    (202) Which intrusion detection system (IDS) examines traffic for suspicious patterns?

    • Active IDS.

    • Passive IDS.

    • Host-based IDS.

    • Network-based IDS.

    Correct Answer
    A. Network-based IDS.
    Explanation
    A network-based intrusion detection system (IDS) examines traffic for suspicious patterns. It monitors network traffic and analyzes it to identify any signs of unauthorized access or malicious activity. Unlike host-based IDS, which focuses on individual hosts, a network-based IDS looks at the entire network and can detect attacks that may involve multiple hosts. Passive IDS, on the other hand, simply observes network traffic without actively taking action. Active IDS combines monitoring with active response mechanisms. Therefore, the correct answer is network-based IDS.

    Rate this question:

  • 41. 

    (212) Who approves or disapproves IS (including software and services) connections to the Air Force Global Information Grid (AF-GIG) and accepts any risk created by the approved connections?

    • Air Force Network Operations commander (AFNetOps/CC).

    • Air Force Information Warfare Center/Information Operations Directorate (AFIWC/IO).

    • Force Network Operation Center (AFNOC).

    • 23 Information Operations Squadron (IOS).

    Correct Answer
    A. Air Force Network Operations commander (AFNetOps/CC).
    Explanation
    The Air Force Network Operations commander (AFNetOps/CC) approves or disapproves IS connections to the Air Force Global Information Grid (AF-GIG) and accepts any risk created by the approved connections.

    Rate this question:

  • 42. 

    (221) All of the following are characteristics and capabilities of a Voice Protection System (VPS) except

    • Securing communications

    • Enabling of real-time event notifications

    • Centralizing yet distributing management

    • Detecting and blocking all inbound and outbound modem connections

    Correct Answer
    A. Centralizing yet distributing management
    Explanation
    A Voice Protection System (VPS) has the characteristics and capabilities of securing communications, enabling real-time event notifications, and detecting and blocking all inbound and outbound modem connections. However, it does not have the capability of centralizing yet distributing management. This means that while it can secure communications and detect modem connections, it does not have the ability to centrally manage and distribute tasks or responsibilities.

    Rate this question:

  • 43. 

    (206) Which security tool is designed to manage sensitive data and enforce security policies across a full range of client/server platforms?

    • Snort.

    • Automatic Security Incident Measurement (ASIM).

    • Enterprise Security Manager (ESM).

    • Internet Security Scanner (ISS).

    Correct Answer
    A. Enterprise Security Manager (ESM).
    Explanation
    Enterprise Security Manager (ESM) is the correct answer because it is a security tool specifically designed to manage sensitive data and enforce security policies across a full range of client/server platforms. Snort is an intrusion detection system, ASIM is a tool for measuring security incidents, and ISS is a vulnerability scanner, none of which are designed for managing sensitive data and enforcing security policies.

    Rate this question:

  • 44. 

    (208) Most firewall implementations that you will encounter will be found at the

    • Integrated network operation security centers (INOSC).

    • Air Force network operating center (AFNOC).

    • Base-level.

    • Major command (MAJCOM).

    Correct Answer
    A. Integrated network operation security centers (INOSC).
    Explanation
    The correct answer is Integrated network operation security centers (INOSC). This is because most firewall implementations are typically found at INOSCs, which are responsible for managing and securing the network operations of an organization. INOSCs are centralized locations where network security professionals monitor, analyze, and respond to network threats and incidents. They play a crucial role in protecting the organization's network infrastructure and ensuring the confidentiality, integrity, and availability of its data and resources.

    Rate this question:

  • 45. 

    (214) Which mail system component sends or retrieves mail between the other agents using specific protocols?

    • Transport agent (TA).

    • Delivery agent (DA).

    • Security agent (SA).

    • User agent (UA).

    Correct Answer
    A. Delivery agent (DA).
    Explanation
    The delivery agent (DA) is responsible for sending or retrieving mail between the other agents using specific protocols. The DA is responsible for delivering the mail to the recipient's mailbox or retrieving it from the sender's mailbox. It interacts with the transport agent (TA) to transfer the mail over the network and with the user agent (UA) to deliver the mail to the recipient. The security agent (SA) is responsible for ensuring the security and integrity of the mail, but it does not directly send or retrieve the mail.

    Rate this question:

  • 46. 

    (209) Use the high availability shared cluster addresses dialog box to do all the following except

    • Configure the shared cluster addresses.

    • Specify or sending and receiving heartbeats.

    • Handle the fastest network traffic on your appliance.

    • Isolate the cluster address from the domain name server (DNS) and default routes.

    Correct Answer
    A. Isolate the cluster address from the domain name server (DNS) and default routes.
    Explanation
    The high availability shared cluster addresses dialog box allows you to configure the shared cluster addresses, specify or send and receive heartbeats, and handle the fastest network traffic on your appliance. However, it does not provide the option to isolate the cluster address from the domain name server (DNS) and default routes.

    Rate this question:

  • 47. 

    (212) Who reports all backdoors and unauthorized connections to Air Force networks discovered during the course of operations?

    • Air Force Network Operations commander (AFNetOps/CC)

    • Air Force Information Warfare Center/Information Operations Directorate (AFIWC/IO).

    • Air Force Network Operation Center (AFNOC).

    • 23 Information Operations Squadron (IOS).

    Correct Answer
    A. Air Force Information Warfare Center/Information Operations Directorate (AFIWC/IO).
    Explanation
    The Air Force Information Warfare Center/Information Operations Directorate (AFIWC/IO) is responsible for reporting all backdoors and unauthorized connections to Air Force networks that are discovered during operations. They are specifically tasked with monitoring and protecting the Air Force's information systems and networks, and ensuring their security. This includes identifying any potential threats or vulnerabilities and reporting them to the appropriate authorities for further action.

    Rate this question:

  • 48. 

    (218) Proxies do not

    • Block unwanted or malicious downloads

    • Protect copyrighted media and intellectual property

    • Prevent organizations from obtaining visibility of users

    • Block webmail and instant messaging (IM) virus propagation

    Correct Answer
    A. Prevent organizations from obtaining visibility of users
    Explanation
    Proxies prevent organizations from obtaining visibility of users. Proxies act as intermediaries between a user's device and the internet, allowing users to browse the web anonymously. By routing internet traffic through a proxy server, organizations are unable to directly track or monitor users' online activities, providing a level of privacy and preventing organizations from obtaining visibility of users.

    Rate this question:

  • 49. 

    (222) Which Voice Protection System (VPS) application provides allows you to view real-time monitoring and policy processing, view system diagnostics, and use the VPS rules-based policy applications?

    • Performance Manager

    • Directory Manager

    • System Console

    • Usage Manager

    Correct Answer
    A. Performance Manager
    Explanation
    Performance Manager is the correct answer because it is the Voice Protection System (VPS) application that allows users to view real-time monitoring and policy processing. It also provides the ability to view system diagnostics and use the VPS rules-based policy applications.

    Rate this question:

Quiz Review Timeline (Updated): Mar 17, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 13, 2012
    Quiz Created by
    Bmx41992
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.