3D053 Vol 2

70 Questions | Attempts: 233
Share
SettingsSettings
Please wait...
  • 1/70 Questions

    The disadvantage of a network-based intrusion detection system  (NIDS) is that it

    • Cannot analyze encrypted packets because it has no method for decrypting the data
    • Monitors log files for inadvisable settings or passwords
    • Monitors traffic on the network on which it is installed
    • Consumes very few network resources
Please wait...
About This Quiz

These are just unit review questions.

3D053 Vol 2 - Quiz

Quiz Preview

  • 2. 

    The disadvantage of a host-based intrusion detection system (HIDS) is that it

    • Can analyze any encrypted data if it is decrypted before reaching the target host

    • Consumes resources on the host resides on and slows the device down

    • Monitors log files for inadvisable settings or passwords

    • Monitors traffic on the host which it is installed

    Correct Answer
    A. Consumes resources on the host resides on and slows the device down
  • 3. 

    What was the previous name for what is now called the McAfee Firewall Enterprise?

    • Sidewinder

    • Death Star

    • Blue Coat

    • Viper

    Correct Answer
    A. Sidewinder
  • 4. 

    Which port range constitutes well-known ports?

    • 0-1023

    • 1024-23535

    • 23536-49151

    • 49152-65535

    Correct Answer
    A. 0-1023
  • 5. 

    Integration of the capabilities of personnel, operations, and technology, and the evolution to network centric warfare best describes what concept?

    • Firewalls

    • Information condition (INFOCON)

    • Security tools

    • Defense in depth

    Correct Answer
    A. Defense in depth
  • 6. 

    What is the default read community string of a simple network management protocol (SNMP) agent?

    • Private

    • Public

    • Secure

    • Unsecure

    Correct Answer
    A. Public
  • 7. 

    Which firewall management interface menu option views the association between MAC addresses on the firewall and its corresponding internet protocol (IP) address?

    • Address Resolution Protocol (ARP)

    • Getroute

    • Ping host

    • Traceroute

    Correct Answer
    A. Address Resolution Protocol (ARP)
  • 8. 

    In which type of port scan does the scanner connect to the same port on more than one machine?

    • Strobe

    • Sweep

    • Stealth

    • Vanilla

    Correct Answer
    A. Sweep
  • 9. 

    Message that are sent to the person administering a mail system are generally addressed to 

    • Domain.admin

    • Administrator

    • Postmaster

    • Mail-host

    Correct Answer
    A. Postmaster
  • 10. 

    When the cached information is verified to be up-to-date, the proxy has ensured information?

    • Currency

    • Freshness

    • Timeliness

    • Authenticity

    Correct Answer
    A. Freshness
  • 11. 

    Who owns the Enterprise Telephony Management system?

    • Unix

    • McAfee

    • Microsoft

    • SecureLogix

    Correct Answer
    A. SecureLogix
  • 12. 

    To limit the risks associated with using simple network management protocols (SNMP),

    • Use access control lists on SNMP agents to accept SNMP messages from all SNMP managers

    • Keep devices requiring SNMP together with those that do not through VLANs

    • Disable all SNMP devices/services if not required

    • Enable the set community strings if possible

    Correct Answer
    A. Disable all SNMP devices/services if not required
  • 13. 

    Restricting what traffic travels in and out of the network best describes what concept?

    • Firewalls

    • Internet Security Scanner

    • Security tools

    • Defense in depth

    Correct Answer
    A. Firewalls
  • 14. 

    Which access control list (ACL) restricts packets into or out of a given layer 3 interface?

    • Port Access Control (PACL)

    • Router Access Control List (RACL)

    • Virtual Local Area Network Access Control List (VACL)

    • Firewall Access Control List (FACL)

    Correct Answer
    A. Router Access Control List (RACL)
  • 15. 

    When using secure split mail services, all external simple message transfer protocol (SMTP) hosts will connect to the firewall's

    • Local servers

    • Non-internet server

    • Internal sendmail server

    • External sendmail server

    Correct Answer
    A. External sendmail server
  • 16. 

    Above which layer of the open systems integration (OSI) model are protocols designed to reside?

    • Presentation

    • Transport

    • Network

    • Session

    Correct Answer
    A. Session
  • 17. 

    Which flexible command line can be used to gather information form domain name servers (DNS)?

    • NSlookup

    • Server

    • Yype

    • Dig

    Correct Answer
    A. Dig
  • 18. 

    Voice Protection System (VPS) reports provides full-service reporting package that enables you to do all the following except

    • View telecom resource use

    • Track phone network usage

    • Provide conversation transcripts

    • Report on service performance and call quality

    Correct Answer
    A. Provide conversation transcripts
  • 19. 

    A firewall burb can best be defined as

    • A network stack

    • A security policy

    • A set of one or more interfaces

    • A particular installation of a firewall

    Correct Answer
    A. A set of one or more interfaces
  • 20. 

    While monitoring your network, a guideline you should remember is to

    • Observer regular network traffic and look for anomalies

    • Review logs and network statistics at least annually

    • Set triggers for unique intrusions

    • Use a single master intrusion detection system (IDS) product

    Correct Answer
    A. Observer regular network traffic and look for anomalies
  • 21. 

    Which name server is the only one  that should have changes to domain name server (DNS) data?

    • Named

    • Cache-Only

    • Master/Primary

    • Slave/Secondary

    Correct Answer
    A. Master/Primary
  • 22. 

    Port Scanning

    • Is the act of sporadically scanning a computer's ports

    • Sends out a request to connect to any computer

    • Notes which ports responded to the scan

    • Is always malicious in nature

    Correct Answer
    A. Notes which ports responded to the scan
  • 23. 

    Most of the firewall implementations you will encounter will be found at the

    • Integrated network operation security center (INOSC)

    • Air Force network operating center (AFNOC)

    • Based-level

    • Major command (MAJCOM)

    Correct Answer
    A. Integrated network operation security center (INOSC)
  • 24. 

    What does a firewall support that improves systems performance by lessening the load place on the system kernel?

    • Domain name server (DNS)

    • Burbs

    • Proxies

    • Fast path sessions

    Correct Answer
    A. Fast path sessions
  • 25. 

    For what Berkeley Internet Name Domain (BIND) server type can there be as many servers as needed in a domain?

    • Named

    • Cache-Only

    • Master/Primary

    • Slave/Secondary

    Correct Answer
    A. Slave/Secondary
  • 26. 

    The vulnerabilities of voice and data converged networks were highlighted in a report released by the 

    • President's National Security Telecommunications Advisory Committee

    • Air Force Information Warfare Battlelab

    • Air Force Network Integration Center

    • Cryptographic Systems Group

    Correct Answer
    A. President's National Security Telecommunications Advisory Committee
  • 27. 

    Which intrusion detection system (IDS) examines servers or client computers for the patterns of an intrusion?

    • Active IDS

    • Passive IDS

    • Host-based IDS

    • Network-based IDS

    Correct Answer
    A. Host-based IDS
  • 28. 

    Which open source network-based intrusion detection system performs packet logging and real-time traffic analysis as well as protocol analysis, content searching/matching, and active blocking or passive detecting of a variety of attacks and probes?

    • Snort

    • Open source security (OSSEC)

    • Host based security system (HBSS)

    • Intruder alert (ITA)

    Correct Answer
    A. Snort
  • 29. 

    Which intrusion detection system (IDS) examines traffic for suspicious patterns?

    • Active IDS

    • Passive IDS

    • Hosted-based IDS

    • Network-based IDS

    Correct Answer
    A. Network-based IDS
  • 30. 

    When using an intrusion detection system (IDS), remember to

    • Update IDS signatures periodically

    • Deploy one IDS for the entire network

    • Use a centralized management console for system management

    • Consider using either a network -based IDS or host-based IDS

    Correct Answer
    A. Use a centralized management console for system management
  • 31. 

    Which port tool is not used to test your simple network management protocol (SNMP) security?

    • WU_PingProPackage

    • SolarWinds

    • SNMPutil

    • Security Mapper (SMAP)

    Correct Answer
    A. Security Mapper (SMAP)
  • 32. 

    The use of two or more network interface cards (NIC) best describes which type of firewall?

    • Network-level

    • Application-level

    • Corporate/enterprise

    • Personal/small office home office (SOHO)

    Correct Answer
    A. Corporate/enterprise
  • 33. 

    Use the high availability shared cluster addresses dialog box to do all the following except

    • Configure the shared cluster address

    • Specify or sending and receiving heartbeats

    • Handle the fastest network traffic on your appliance

    • Isolate the cluster address from the domain name server (DNS) and default routers

    Correct Answer
    A. Isolate the cluster address from the domain name server (DNS) and default routers
  • 34. 

    What term is used for a domain name server (DNS) architecture when one or more name servers reside behind a firewall, and contain an "inside" hostname and IP address?

    • Split

    • Dual

    • Secure

    • Generic

    Correct Answer
    A. Split
  • 35. 

    The integrated network operations and security center (INOSC) has several responsibilities except

    • Main sole administrative privileges on the firewall

    • Standardize, configure, back up, and otherwise the firewall

    • Maintain a single naming/configuration standard for boundary devices

    • Install patches or perform any upgrade provided by the AF Enterprise Network

    Correct Answer
    A. Install patches or perform any upgrade provided by the AF Enterprise Network
  • 36. 

    Active intrusion detection system (IDS) blocks network traffic when it detects an intrusion. Normally, active IDSs are incorporated into

    • Switches

    • Firewalls

    • Routers

    • Servers

    Correct Answer
    A. Firewalls
  • 37. 

    Proxies do not 

    • Block unwanted or malicious downloads

    • Protect copyrighted media and intellectual property

    • Prevent organizations from obtaining visibility of users

    • Block webmail and instant messaging (IM) virus propagation

    Correct Answer
    A. Prevent organizations from obtaining visibility of users
  • 38. 

    Which network-based security tool is a hardware and software and software system that sits on AF networks "listening" for "suspicious activity" that is characteristic of intruder techniques?

    • Snort

    • Automatic Security Incident Measurement (ASIM)

    • Enterprise Security Manager (ESM)

    • Internet Security Scanner (ISS)

    Correct Answer
    A. Automatic Security Incident Measurement (ASIM)
  • 39. 

    You can implement all of the following security features to help define our internet protocol (IP) telephony systems from attackers except

    • Consolidating your voice with your data using virtual local area network (VLAN)

    • Enabling access control lists (ACL) on firewalls, routers, an switches.

    • Deploying protection from dynamic host configuration protocol (DHCP) spoofing

    • Enabling port security access to only allow the required devices needed by the client.

    Correct Answer
    A. Consolidating your voice with your data using virtual local area network (VLAN)
  • 40. 

    When using transparent mail services, the following mail filtering features are available except

    • Message attachment filtering

    • Destination address filtering

    • Command filtering

    • Header filtering

    Correct Answer
    A. Message attachment filtering
  • 41. 

    What is the default firewall shutdown option?

    • Halt system

    • Power down system

    • Reboot to operational kernel

    • Shutdown to emergency maintenance mode

    Correct Answer
    A. Reboot to operational kernel
  • 42. 

    Which Berkeley Internet Name Domain (BIND) system file provide reverse mapping?

    • Resource records

    • Pointer (PTR) records

    • Zone records

    • Root cache

    Correct Answer
    A. Pointer (PTR) records
  • 43. 

    Which Voice Protection System (VPS) tree pane contains predefined Report Templates, Elements, and Date Ranges provided with your system?

    • User

    • PUBLIC

    • SecureLogix

    • Administrators

    Correct Answer
    A. SecureLogix
  • 44. 

    Which intrusion detection system (IDS) monitors packets for protocol anomalies and known virus signatures?

    • Active IDS

    • Passive IDS

    • Host-based IDS

    • Network-base IDS

    Correct Answer
    A. Network-base IDS
  • 45. 

    Which type of firewall is typically used when speed is essential?

    • Network-level

    • Application-level

    • Corporate/enterprise

    • Personal/small office home office (SOHO)

    Correct Answer
    A. Network-level
  • 46. 

    Who approves or disapproves IS (including software and services) connections to the Air Force Global Information  Grid (AF GIG) and accepts any risk created by the approved connections?

    • Air Force Network Operations Command (AFNetOps/CC)

    • Air Force Information Warfare Center/Information Operations Directorate (AFIWC/IO)

    • Air Force Network Operations Center (AFNOC)

    • 23 Information Operations Squadron (IOS)

    Correct Answer
    A. Air Force Network Operations Command (AFNetOps/CC)
  • 47. 

    Which Voice Protection System (VPS) application generates reports of VPS system activity, policy processing, telecom cost accounting, and resource utilization?

    • Performance Manager

    • Directory Manager

    • System Console

    • Usage Manager

    Correct Answer
    A. Usage Manager
  • 48. 

    Which intrusion detection system (IDS) uses software sensors?

    • Active IDS

    • Passive IDS

    • Host-based IDS

    • Network-based IDS

    Correct Answer
    A. Host-based IDS
  • 49. 

    Which McAfee Firewall Enterprise management interface is the graphical software that runs a windows computer within your network?

    • Control center

    • Admin console

    • Command center

    • Command-line interface (CLI)

    Correct Answer
    A. Admin console

Quiz Review Timeline (Updated): Jun 19, 2019 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 19, 2019
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 05, 2012
    Quiz Created by
    CommV1
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.