Question 3. 3. (TCO 11) Firewalls can operate at all OSI layers except which of
ID: 3850024 • Letter: Q
Question
4 - transport
3 - network
2 - data link
1 - physical Question 4.4. (TCO 11) A Layer 2 firewall is also called a(n) _____. (Points : 5) packet-filtering router
bastion host
packet-filtering bridge
application-level gateway
circuit-level gateway Question 5.5. (TCO 12) Modern intrusion detection systems act as sensors for hosts and network devices and work in a centrally controlled distributed fashion using _____. (Points : 5) software
remote procedure calls
agent technology
common interfaces
access to local audit records Question 6.6. (TCO 12) A decoy used to lure intruders into staying around is called a(n) _____. (Points : 5) pharm
phish
entrapment
honeypot
mug of ale Question 7.7. (TCO 12) An event where seemingly harmless data is forwarded by the router to a host on an internal network is known as a _____. (Points : 5) drive-by attack
proxy-server attack
data-driven attack
penetration testing
steganography Question 8.8. (TCO 13) Which form of malware is independent of the operating system and replicating? (Points : 5) Trap door
Virus
Worm
Trojan
Logic bomb Question 9.9. (TCO 13) Which phase of the SDLC should have security representation? (Points : 5) Concept definition
Requirements definition
Design
Test and Evaluation
All phases Question 10.10. (TCO 13) _____ is a category of software that contains code which intends to wreak havoc on the host computer. (Points : 5) An antivirus program
Malware
A firewall
A logic bomb
A trojan horse
Explanation / Answer
Answer for Question 1: Application , Network and Transport Layears
Answer for Question 2: packet-filtering router is also called as Layer 2 Firewall
Answer for Question 3: agent technology is using for centrally controlled distributed fashion
Answer for Question 4:
A decoy used to lure intruders into staying around is called honey pot
Answer or Question 5:
An event where seemingly harmless data is forwarded by the router to a host on an internal network is known as a data-driven-attack
Answer for Question 6:
All Phases of SDLC should have security representation.
Answer for Question 7:
Malware is a category of software that contains code which intends to wreak havoc on the host computer.
Answer for Question 8: Worm
A worm is the only thing that is not dependent on the OS.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.