CDC 3D053 Cyber Surety Volume 2. Information Protection - Boundary Control Journeyman URE's
0–1023.
1024–23535.
23536–49151.
49152–65535.
Rate this question:
Can analyze any encrypted data if it is decrypted before reaching the target host.
Consumes resources on the host it resides on and slows that device down.
Monitors log files for inadvisable settings or passwords.
Monitors traffic on the host on which it is installed.
Rate this question:
Firewalls.
Information condition (INFOCON).
Security tools.
Defense in depth.
Rate this question:
Address Resolution Protocol (ARP).
Getroute.
Ping host.
Traceroute.
Rate this question:
Use access control lists on SNMP agents to accept SNMP messages from all SNMP managers.
Keep devices requiring SNMP together with those that do not through VLANs.
Disable all SNMP devices/services if not required.
Enable the set community strings if possible.
Rate this question:
Private.
Public.
Secure.
Unsecure.
Rate this question:
Observe regular network traffic and look for anomalies
Review logs and network statistics at least annually.
Set triggers for unique intrusions.
Use a single master intrusion detection system (IDS) product
Rate this question:
Sidewinder.
Death Star.
Blue Coat.
Viper.
Rate this question:
Local server.
Non-Internet server.
Internal sendmail server.
External sendmail server
Rate this question:
Firewalls.
Internet Security Scanner (INFOCON).
Security tools.
Defense in depth.
Rate this question:
A network stack.
A security policy.
A set of one or more interfaces.
A particular installation of a firewall.
Rate this question:
Domain.admin.
Administrator.
Postmaster.
Mail-host
Rate this question:
Currency.
Freshness.
Timeliness.
Authenticity.
Rate this question:
View telecom resource use.
Track phone network usage.
Provide conversation transcripts.
Report on service performance and call quality.
Rate this question:
Port Access Control List (PACL).
Router Access Control List (RACL).
Virtual Local Area Network Access Control List (VACL).
Firewall Access Control List (FACL).
Rate this question:
Unix.
McAfee.
Microsoft.
SecureLogix.
Rate this question:
Switches.
Firewalls.
Routers.
Servers.
Rate this question:
Presentation.
Transport.
Network.
Session.
Rate this question:
Split.
Dual.
Secure.
Generic.
Rate this question:
Network-level.
Application-Level.
Corporate/enterprise.
Personal/Small Office Home Office (SOHO).
Rate this question:
Maintain sole administrative privileges on the firewall.
Standardize, configure, back up, and otherwise maintain the firewall.
Maintain a single naming/configuration standard for boundary devices.
Install patches or perform any upgrades provided by AF Enterprise Network.
Rate this question:
Strobe.
Sweep.
Stealth.
Vanilla.
Rate this question:
WU_PingProPack.
SolarWinds.
SNMPutil.
Security mapper (SMAP).
Rate this question:
Named.
Cache-Only
Master/Primary.
Slave/Secondary.
Rate this question:
Is the act of sporadically scanning a computer’s ports.
Sends out a request to connect to any computer.
Notes which ports responded to the scan.
Is always malicious in nature.
Rate this question:
Named.
Cache-Only.
Master/Primary.
Slave/Secondary.
Rate this question:
Consolidating your voice with your data using virtual local area networks (VLAN).
Enabling access control lists (ACL) on firewalls, routers, and switches.
Deploying protection from dynamic host configuration protocol (DHCP) spoofing.
Enabling port security access to only allow the required devices needed by the client.
Rate this question:
Network-level.
Application-level.
Corporate/enterprise.
Personal/Small Office Home Office (SOHO).
Rate this question:
Domain name server (DNS).
Burbs.
Proxies.
Fast Path sessions.
Rate this question:
Nslookup.
Server.
Yype.
Dig.
Rate this question:
Update IDS signatures periodically.
Deploy one IDS for the entire network.
Use a centralized management console for system management.
Consider using either a network-based IDS or host-based IDS.
Rate this question:
Resource records.
Pointer (PTR) records.
Zone records
Root cache
Rate this question:
I
II
III
IV
Rate this question:
Snort.
Automatic Security Incident Measurement (ASIM).
Enterprise Security Manager (ESM).
Internet Security Scanner (ISS).
Control center.
Admin console.
Command center.
Command-line interface (CLI).
Rate this question:
Halt system.
Power down system.
Reboot to operational kernel.
Shutdown to emergency maintenance mode.
Rate this question:
President’s National Security Telecommunications Advisory Committee
Air Force Information Warfare Battlelab
Air Force Network Integration Center
Cryptographic Systems Group
Rate this question:
Active IDS.
Passive IDS.
Host-based IDS.
Network-based IDS.
Rate this question:
Active IDS.
Passive IDS.
Host-based IDS.
Network-based IDS.
Rate this question:
Air Force Network Operations commander (AFNetOps/CC).
Air Force Information Warfare Center/Information Operations Directorate (AFIWC/IO).
Force Network Operation Center (AFNOC).
23 Information Operations Squadron (IOS).
Rate this question:
Securing communications
Enabling of real-time event notifications
Centralizing yet distributing management
Detecting and blocking all inbound and outbound modem connections
Rate this question:
Snort.
Automatic Security Incident Measurement (ASIM).
Enterprise Security Manager (ESM).
Internet Security Scanner (ISS).
Rate this question:
Integrated network operation security centers (INOSC).
Air Force network operating center (AFNOC).
Base-level.
Major command (MAJCOM).
Rate this question:
Transport agent (TA).
Delivery agent (DA).
Security agent (SA).
User agent (UA).
Rate this question:
Configure the shared cluster addresses.
Specify or sending and receiving heartbeats.
Handle the fastest network traffic on your appliance.
Isolate the cluster address from the domain name server (DNS) and default routes.
Rate this question:
Air Force Network Operations commander (AFNetOps/CC)
Air Force Information Warfare Center/Information Operations Directorate (AFIWC/IO).
Air Force Network Operation Center (AFNOC).
23 Information Operations Squadron (IOS).
Rate this question:
Block unwanted or malicious downloads
Protect copyrighted media and intellectual property
Prevent organizations from obtaining visibility of users
Block webmail and instant messaging (IM) virus propagation
Rate this question:
Performance Manager
Directory Manager
System Console
Usage Manager
Rate this question:
Quiz Review Timeline (Updated): Mar 17, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.