Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 3. 3. (TCO 11) Firewalls can operate at all OSI layers except which of

ID: 3850024 • Letter: Q

Question


Question 3.3. (TCO 11) Firewalls can operate at all OSI layers except which of the following? (Points : 5)        7 - application
       4 - transport
       3 - network
       2 - data link
       1 - physical Question 4.4. (TCO 11) A Layer 2 firewall is also called a(n) _____. (Points : 5)        packet-filtering router
       bastion host
       packet-filtering bridge
       application-level gateway
       circuit-level gateway Question 5.5. (TCO 12) Modern intrusion detection systems act as sensors for hosts and network devices and work in a centrally controlled distributed fashion using _____. (Points : 5)        software
       remote procedure calls
       agent technology
       common interfaces
       access to local audit records Question 6.6. (TCO 12) A decoy used to lure intruders into staying around is called a(n) _____. (Points : 5)        pharm
       phish
       entrapment
       honeypot
       mug of ale Question 7.7. (TCO 12) An event where seemingly harmless data is forwarded by the router to a host on an internal network is known as a _____. (Points : 5)        drive-by attack
       proxy-server attack
       data-driven attack
       penetration testing
       steganography Question 8.8. (TCO 13) Which form of malware is independent of the operating system and replicating? (Points : 5)        Trap door
       Virus
       Worm
       Trojan
       Logic bomb Question 9.9. (TCO 13) Which phase of the SDLC should have security representation? (Points : 5)        Concept definition
       Requirements definition
       Design
       Test and Evaluation
       All phases Question 10.10. (TCO 13) _____ is a category of software that contains code which intends to wreak havoc on the host computer. (Points : 5)        An antivirus program
       Malware
       A firewall
       A logic bomb
       A trojan horse

Explanation / Answer


Answer for Question 1: Application , Network and Transport Layears
Answer for Question 2: packet-filtering router is also called as Layer 2 Firewall
Answer for Question 3: agent technology is using for centrally controlled distributed fashion
Answer for Question 4:
A decoy used to lure intruders into staying around is called honey pot

Answer or Question 5:
An event where seemingly harmless data is forwarded by the router to a host on an internal network is known as a data-driven-attack

Answer for Question 6:
All Phases of SDLC should have security representation.
Answer for Question 7:
Malware is a category of software that contains code which intends to wreak havoc on the host computer.
Answer for Question 8: Worm
A worm is the only thing that is not dependent on the OS.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote