3D053 Vol 2

70 Questions | Attempts: 233
Please wait...
Question 1 / 71
🏆 Rank #--
Score 0/100

1. The disadvantage of a network-based intrusion detection system  (NIDS) is that it

Submit
Please wait...
About This Quiz
3D053 Vol 2 - Quiz

These are just unit review questions.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. What was the previous name for what is now called the McAfee Firewall Enterprise?

Submit

3. The disadvantage of a host-based intrusion detection system (HIDS) is that it

Submit

4. Which port range constitutes well-known ports?

Submit

5. Integration of the capabilities of personnel, operations, and technology, and the evolution to network centric warfare best describes what concept?

Submit

6. What is the default read community string of a simple network management protocol (SNMP) agent?

Submit

7. Which firewall management interface menu option views the association between MAC addresses on the firewall and its corresponding internet protocol (IP) address?

Submit

8. In which type of port scan does the scanner connect to the same port on more than one machine?

Submit

9. Message that are sent to the person administering a mail system are generally addressed to 

Submit

10. When the cached information is verified to be up-to-date, the proxy has ensured information?

Submit

11. Who owns the Enterprise Telephony Management system?

Submit

12. To limit the risks associated with using simple network management protocols (SNMP),

Submit

13. Restricting what traffic travels in and out of the network best describes what concept?

Submit

14. When using secure split mail services, all external simple message transfer protocol (SMTP) hosts will connect to the firewall's

Submit

15. Which access control list (ACL) restricts packets into or out of a given layer 3 interface?

Submit

16. Above which layer of the open systems integration (OSI) model are protocols designed to reside?

Submit

17. Voice Protection System (VPS) reports provides full-service reporting package that enables you to do all the following except

Submit

18. Which flexible command line can be used to gather information form domain name servers (DNS)?

Submit

19. A firewall burb can best be defined as

Submit

20. While monitoring your network, a guideline you should remember is to

Submit

21. Which name server is the only one  that should have changes to domain name server (DNS) data?

Submit

22. Port Scanning

Submit

23. Most of the firewall implementations you will encounter will be found at the

Submit

24. What does a firewall support that improves systems performance by lessening the load place on the system kernel?

Submit

25. For what Berkeley Internet Name Domain (BIND) server type can there be as many servers as needed in a domain?

Submit

26. The vulnerabilities of voice and data converged networks were highlighted in a report released by the 

Submit

27. Which open source network-based intrusion detection system performs packet logging and real-time traffic analysis as well as protocol analysis, content searching/matching, and active blocking or passive detecting of a variety of attacks and probes?

Submit

28. Which intrusion detection system (IDS) examines servers or client computers for the patterns of an intrusion?

Submit

29. Which port tool is not used to test your simple network management protocol (SNMP) security?

Submit

30. The use of two or more network interface cards (NIC) best describes which type of firewall?

Submit

31. Use the high availability shared cluster addresses dialog box to do all the following except

Submit

32. What term is used for a domain name server (DNS) architecture when one or more name servers reside behind a firewall, and contain an "inside" hostname and IP address?

Submit

33. Which intrusion detection system (IDS) examines traffic for suspicious patterns?

Submit

34. When using an intrusion detection system (IDS), remember to

Submit

35. The integrated network operations and security center (INOSC) has several responsibilities except

Submit

36. Active intrusion detection system (IDS) blocks network traffic when it detects an intrusion. Normally, active IDSs are incorporated into

Submit

37. Proxies do not 

Submit

38. When using transparent mail services, the following mail filtering features are available except

Submit

39. Which network-based security tool is a hardware and software and software system that sits on AF networks "listening" for "suspicious activity" that is characteristic of intruder techniques?

Submit

40. You can implement all of the following security features to help define our internet protocol (IP) telephony systems from attackers except

Submit

41. Which Voice Protection System (VPS) tree pane contains predefined Report Templates, Elements, and Date Ranges provided with your system?

Submit

42. What is the default firewall shutdown option?

Submit

43. Which Berkeley Internet Name Domain (BIND) system file provide reverse mapping?

Submit

44. Which intrusion detection system (IDS) monitors packets for protocol anomalies and known virus signatures?

Submit

45. Which Voice Protection System (VPS) application generates reports of VPS system activity, policy processing, telecom cost accounting, and resource utilization?

Submit

46. Which type of firewall is typically used when speed is essential?

Submit

47. Who approves or disapproves IS (including software and services) connections to the Air Force Global Information  Grid (AF GIG) and accepts any risk created by the approved connections?

Submit

48. Which mail system components sends or retrieves mail between the other agents using specific protocols?

Submit

49. Which McAfee Firewall Enterprise management interface is the graphical software that runs a windows computer within your network?

Submit

50. During the initial research for voice system security, who recognized that the most common security threats could be addressed by voice protection systems (VPS)?

Submit

51. Which intrusion detection system (IDS) uses software sensors?

Submit

52. Which proxy is located near the web server and acts as an intermediary between a web server and the internet?

Submit

53. What severity code applies to any vulnerability that provides information that gives an unauthorized person the means to circumvent security  controls?

Submit

54. Which Voice Protection System (VPS) application provides allows you to view real-time monitoring and policy processing, view system diagnostics, and the VPS rules-based policy applications?

Submit

55. Which firewall shutdown option is useful if you need to connect directly to the firewall to access the basic input/output systems (BIOS)?

Submit

56. Which is not a category of software package available today used that is used to detect and monitor network activity?

Submit

57. All of the following are characteristics and capabilities of a Voice Protection System (VPS)  except

Submit

58. All of the following are Voice Protection System (VPS) policy types except

Submit

59. Which email server relays all email entering or exiting the local network?

Submit

60. Which security tool is designed to manage sensitive data and enforce security policies across a full range of client/server platforms?

Submit

61. In regards to Berkeley Internet Name Domain (BIND) system files, items stored in the domain name server  (DNS) database best describes

Submit

62. What severity code applies to any vulnerability that, when resolved, will prevent the possibility of degraded security?

Submit

63. Which Berkeley Internet Name Domain (BIND) server is responsible for zone transfers?

Submit

64. Which email server delivers all outgoing email to the mail relay server?

Submit

65. Who reports all backdoors and unauthorized connections to Air Force networks discovered during the course of operations?

Submit

66. Which organization has the responsibility of developing Air Force Ports, Protocols and Services (AF PPS) policies and procedures?

Submit

67. Which organization has direct operational control of Air Force Ports, Protocols and Services (AF PPS)?

Submit

68. Which type of firewall views information as a data stream and not as a series of packets?

Submit

69. What type of proxy must be run because of an attacker's potential to exploit an operating system?

Submit

70. What severity code applies to any vulnerability that provides information that potentially could lead to a compromise?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (70)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The disadvantage of a network-based intrusion detection system ...
What was the previous name for what is now called the McAfee Firewall...
The disadvantage of a host-based intrusion detection system (HIDS) is...
Which port range constitutes well-known ports?
Integration of the capabilities of personnel, operations, and...
What is the default read community string of a simple network...
Which firewall management interface menu option views the association...
In which type of port scan does the scanner connect to the same port...
Message that are sent to the person administering a mail system are...
When the cached information is verified to be up-to-date, the proxy...
Who owns the Enterprise Telephony Management system?
To limit the risks associated with using simple network management...
Restricting what traffic travels in and out of the network best...
When using secure split mail services, all external simple message...
Which access control list (ACL) restricts packets into or out of a...
Above which layer of the open systems integration (OSI) model are...
Voice Protection System (VPS) reports provides full-service reporting...
Which flexible command line can be used to gather information form...
A firewall burb can best be defined as
While monitoring your network, a guideline you should remember is to
Which name server is the only one  that should have changes to...
Port Scanning
Most of the firewall implementations you will encounter will be found...
What does a firewall support that improves systems performance by...
For what Berkeley Internet Name Domain (BIND) server type can there be...
The vulnerabilities of voice and data converged networks were...
Which open source network-based intrusion detection system performs...
Which intrusion detection system (IDS) examines servers or client...
Which port tool is not used to test your simple network management...
The use of two or more network interface cards (NIC) best describes...
Use the high availability shared cluster addresses dialog box to do...
What term is used for a domain name server (DNS) architecture when one...
Which intrusion detection system (IDS) examines traffic for suspicious...
When using an intrusion detection system (IDS), remember to
The integrated network operations and security center (INOSC) has...
Active intrusion detection system (IDS) blocks network traffic when it...
Proxies do not 
When using transparent mail services, the following mail filtering...
Which network-based security tool is a hardware and software and...
You can implement all of the following security features to help...
Which Voice Protection System (VPS) tree pane contains predefined...
What is the default firewall shutdown option?
Which Berkeley Internet Name Domain (BIND) system file provide reverse...
Which intrusion detection system (IDS) monitors packets for protocol...
Which Voice Protection System (VPS) application generates reports of...
Which type of firewall is typically used when speed is essential?
Who approves or disapproves IS (including software and services)...
Which mail system components sends or retrieves mail between the other...
Which McAfee Firewall Enterprise management interface is the graphical...
During the initial research for voice system security, who...
Which intrusion detection system (IDS) uses software sensors?
Which proxy is located near the web server and acts as an intermediary...
What severity code applies to any vulnerability that provides...
Which Voice Protection System (VPS) application provides allows you to...
Which firewall shutdown option is useful if you need to connect...
Which is not a category of software package available today used that...
All of the following are characteristics and capabilities of a Voice...
All of the following are Voice Protection System (VPS) policy...
Which email server relays all email entering or exiting the local...
Which security tool is designed to manage sensitive data and enforce...
In regards to Berkeley Internet Name Domain (BIND) system files, items...
What severity code applies to any vulnerability that, when resolved,...
Which Berkeley Internet Name Domain (BIND) server is responsible for...
Which email server delivers all outgoing email to the mail relay...
Who reports all backdoors and unauthorized connections to Air Force...
Which organization has the responsibility of developing Air Force...
Which organization has direct operational control of Air Force Ports,...
Which type of firewall views information as a data stream and not as a...
What type of proxy must be run because of an attacker's potential...
What severity code applies to any vulnerability that provides...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!