3D053 Vol 2

70 Questions | Attempts: 233
Share
Please wait...
Question 1 / 70
0 %
0/100
Score 0/100
1. The disadvantage of a network-based intrusion detection system  (NIDS) is that it
Submit
Please wait...
About This Quiz
3D053 Vol 2 - Quiz

These are just unit review questions.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. What was the previous name for what is now called the McAfee Firewall Enterprise?
Submit
3. The disadvantage of a host-based intrusion detection system (HIDS) is that it
Submit
4. Which port range constitutes well-known ports?
Submit
5. Integration of the capabilities of personnel, operations, and technology, and the evolution to network centric warfare best describes what concept?
Submit
6. What is the default read community string of a simple network management protocol (SNMP) agent?
Submit
7. Which firewall management interface menu option views the association between MAC addresses on the firewall and its corresponding internet protocol (IP) address?
Submit
8. In which type of port scan does the scanner connect to the same port on more than one machine?
Submit
9. Message that are sent to the person administering a mail system are generally addressed to 
Submit
10. When the cached information is verified to be up-to-date, the proxy has ensured information?
Submit
11. Who owns the Enterprise Telephony Management system?
Submit
12. To limit the risks associated with using simple network management protocols (SNMP),
Submit
13. Restricting what traffic travels in and out of the network best describes what concept?
Submit
14. When using secure split mail services, all external simple message transfer protocol (SMTP) hosts will connect to the firewall's
Submit
15. Which access control list (ACL) restricts packets into or out of a given layer 3 interface?
Submit
16. Above which layer of the open systems integration (OSI) model are protocols designed to reside?
Submit
17. Voice Protection System (VPS) reports provides full-service reporting package that enables you to do all the following except
Submit
18. Which flexible command line can be used to gather information form domain name servers (DNS)?
Submit
19. A firewall burb can best be defined as
Submit
20. While monitoring your network, a guideline you should remember is to
Submit
21. Which name server is the only one  that should have changes to domain name server (DNS) data?
Submit
22. Port Scanning
Submit
23. Most of the firewall implementations you will encounter will be found at the
Submit
24. What does a firewall support that improves systems performance by lessening the load place on the system kernel?
Submit
25. For what Berkeley Internet Name Domain (BIND) server type can there be as many servers as needed in a domain?
Submit
26. The vulnerabilities of voice and data converged networks were highlighted in a report released by the 
Submit
27. Which open source network-based intrusion detection system performs packet logging and real-time traffic analysis as well as protocol analysis, content searching/matching, and active blocking or passive detecting of a variety of attacks and probes?
Submit
28. Which intrusion detection system (IDS) examines servers or client computers for the patterns of an intrusion?
Submit
29. Which port tool is not used to test your simple network management protocol (SNMP) security?
Submit
30. The use of two or more network interface cards (NIC) best describes which type of firewall?
Submit
31. Use the high availability shared cluster addresses dialog box to do all the following except
Submit
32. What term is used for a domain name server (DNS) architecture when one or more name servers reside behind a firewall, and contain an "inside" hostname and IP address?
Submit
33. Which intrusion detection system (IDS) examines traffic for suspicious patterns?
Submit
34. When using an intrusion detection system (IDS), remember to
Submit
35. The integrated network operations and security center (INOSC) has several responsibilities except
Submit
36. Active intrusion detection system (IDS) blocks network traffic when it detects an intrusion. Normally, active IDSs are incorporated into
Submit
37. Proxies do not 
Submit
38. When using transparent mail services, the following mail filtering features are available except
Submit
39. Which network-based security tool is a hardware and software and software system that sits on AF networks "listening" for "suspicious activity" that is characteristic of intruder techniques?
Submit
40. You can implement all of the following security features to help define our internet protocol (IP) telephony systems from attackers except
Submit
41. Which Voice Protection System (VPS) tree pane contains predefined Report Templates, Elements, and Date Ranges provided with your system?
Submit
42. What is the default firewall shutdown option?
Submit
43. Which Berkeley Internet Name Domain (BIND) system file provide reverse mapping?
Submit
44. Which intrusion detection system (IDS) monitors packets for protocol anomalies and known virus signatures?
Submit
45. Which Voice Protection System (VPS) application generates reports of VPS system activity, policy processing, telecom cost accounting, and resource utilization?
Submit
46. Which type of firewall is typically used when speed is essential?
Submit
47. Who approves or disapproves IS (including software and services) connections to the Air Force Global Information  Grid (AF GIG) and accepts any risk created by the approved connections?
Submit
48. Which mail system components sends or retrieves mail between the other agents using specific protocols?
Submit
49. Which McAfee Firewall Enterprise management interface is the graphical software that runs a windows computer within your network?
Submit
50. During the initial research for voice system security, who recognized that the most common security threats could be addressed by voice protection systems (VPS)?
Submit
51. Which intrusion detection system (IDS) uses software sensors?
Submit
52. Which proxy is located near the web server and acts as an intermediary between a web server and the internet?
Submit
53. What severity code applies to any vulnerability that provides information that gives an unauthorized person the means to circumvent security  controls?
Submit
54. Which Voice Protection System (VPS) application provides allows you to view real-time monitoring and policy processing, view system diagnostics, and the VPS rules-based policy applications?
Submit
55. Which firewall shutdown option is useful if you need to connect directly to the firewall to access the basic input/output systems (BIOS)?
Submit
56. Which is not a category of software package available today used that is used to detect and monitor network activity?
Submit
57. All of the following are characteristics and capabilities of a Voice Protection System (VPS)  except
Submit
58. All of the following are Voice Protection System (VPS) policy types except
Submit
59. Which email server relays all email entering or exiting the local network?
Submit
60. Which security tool is designed to manage sensitive data and enforce security policies across a full range of client/server platforms?
Submit
61. In regards to Berkeley Internet Name Domain (BIND) system files, items stored in the domain name server  (DNS) database best describes
Submit
62. What severity code applies to any vulnerability that, when resolved, will prevent the possibility of degraded security?
Submit
63. Which Berkeley Internet Name Domain (BIND) server is responsible for zone transfers?
Submit
64. Which email server delivers all outgoing email to the mail relay server?
Submit
65. Who reports all backdoors and unauthorized connections to Air Force networks discovered during the course of operations?
Submit
66. Which organization has the responsibility of developing Air Force Ports, Protocols and Services (AF PPS) policies and procedures?
Submit
67. Which organization has direct operational control of Air Force Ports, Protocols and Services (AF PPS)?
Submit
68. Which type of firewall views information as a data stream and not as a series of packets?
Submit
69. What type of proxy must be run because of an attacker's potential to exploit an operating system?
Submit
70. What severity code applies to any vulnerability that provides information that potentially could lead to a compromise?
Submit
View My Results

Quiz Review Timeline (Updated): Jun 19, 2019 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 19, 2019
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 05, 2012
    Quiz Created by
    CommV1
Cancel
  • All
    All (70)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The disadvantage of a network-based intrusion detection system ...
What was the previous name for what is now called the McAfee Firewall...
The disadvantage of a host-based intrusion detection system (HIDS) is...
Which port range constitutes well-known ports?
Integration of the capabilities of personnel, operations, and...
What is the default read community string of a simple network...
Which firewall management interface menu option views the association...
In which type of port scan does the scanner connect to the same port...
Message that are sent to the person administering a mail system are...
When the cached information is verified to be up-to-date, the proxy...
Who owns the Enterprise Telephony Management system?
To limit the risks associated with using simple network management...
Restricting what traffic travels in and out of the network best...
When using secure split mail services, all external simple message...
Which access control list (ACL) restricts packets into or out of a...
Above which layer of the open systems integration (OSI) model are...
Voice Protection System (VPS) reports provides full-service reporting...
Which flexible command line can be used to gather information form...
A firewall burb can best be defined as
While monitoring your network, a guideline you should remember is to
Which name server is the only one  that should have changes to...
Port Scanning
Most of the firewall implementations you will encounter will be found...
What does a firewall support that improves systems performance by...
For what Berkeley Internet Name Domain (BIND) server type can there be...
The vulnerabilities of voice and data converged networks were...
Which open source network-based intrusion detection system performs...
Which intrusion detection system (IDS) examines servers or client...
Which port tool is not used to test your simple network management...
The use of two or more network interface cards (NIC) best describes...
Use the high availability shared cluster addresses dialog box to do...
What term is used for a domain name server (DNS) architecture when one...
Which intrusion detection system (IDS) examines traffic for suspicious...
When using an intrusion detection system (IDS), remember to
The integrated network operations and security center (INOSC) has...
Active intrusion detection system (IDS) blocks network traffic when it...
Proxies do not 
When using transparent mail services, the following mail filtering...
Which network-based security tool is a hardware and software and...
You can implement all of the following security features to help...
Which Voice Protection System (VPS) tree pane contains predefined...
What is the default firewall shutdown option?
Which Berkeley Internet Name Domain (BIND) system file provide reverse...
Which intrusion detection system (IDS) monitors packets for protocol...
Which Voice Protection System (VPS) application generates reports of...
Which type of firewall is typically used when speed is essential?
Who approves or disapproves IS (including software and services)...
Which mail system components sends or retrieves mail between the other...
Which McAfee Firewall Enterprise management interface is the graphical...
During the initial research for voice system security, who...
Which intrusion detection system (IDS) uses software sensors?
Which proxy is located near the web server and acts as an intermediary...
What severity code applies to any vulnerability that provides...
Which Voice Protection System (VPS) application provides allows you to...
Which firewall shutdown option is useful if you need to connect...
Which is not a category of software package available today used that...
All of the following are characteristics and capabilities of a Voice...
All of the following are Voice Protection System (VPS) policy...
Which email server relays all email entering or exiting the local...
Which security tool is designed to manage sensitive data and enforce...
In regards to Berkeley Internet Name Domain (BIND) system files, items...
What severity code applies to any vulnerability that, when resolved,...
Which Berkeley Internet Name Domain (BIND) server is responsible for...
Which email server delivers all outgoing email to the mail relay...
Who reports all backdoors and unauthorized connections to Air Force...
Which organization has the responsibility of developing Air Force...
Which organization has direct operational control of Air Force Ports,...
Which type of firewall views information as a data stream and not as a...
What type of proxy must be run because of an attacker's potential...
What severity code applies to any vulnerability that provides...
Alert!

Advertisement