Chapter 9 Quiz_ Attempt review
pdf
keyboard_arrow_up
School
Trine University *
*We aren’t endorsed by this school
Course
5063
Subject
Information Systems
Date
Nov 24, 2024
Type
Pages
3
Uploaded by AmbassadorPencilRedPanda44
11/22/23, 2:11 PM
Chapter 9 Quiz: Attempt review
https://courses.campbellsville.edu/mod/quiz/review.php?attempt=2763441&cmid=4283726
1/3
Started on
Tuesday, November 7, 2023, 2:52 AM
State
Finished
Completed on
Tuesday, November 7, 2023, 2:57 AM
Time taken
4 mins 29 secs
Grade
70.00
out of 100.00
Question
1
Complete
0.00 points out of 10.00
Question
2
Complete
10.00 points out of 10.00
Question
3
Complete
10.00 points out of 10.00
The countermeasure to tiny fragment attacks is to discard packets with an inside source address if the packet arrives on an external
interface.
Select one:
True
False
A DMZ is one of the internal firewalls protecting the bulk of the enterprise network.
Select one:
True
False
The firewall can protect against attacks that bypass the firewall.
Select one:
True
False
11/22/23, 2:11 PM
Chapter 9 Quiz: Attempt review
https://courses.campbellsville.edu/mod/quiz/review.php?attempt=2763441&cmid=4283726
2/3
Question
4
Complete
10.00 points out of 10.00
Question
5
Complete
10.00 points out of 10.00
Question
6
Complete
0.00 points out of 10.00
Question
7
Complete
10.00 points out of 10.00
The firewall may be a single computer system or a set of two or more systems that cooperate to perform the firewall function.
Select one:
True
False
A traditional packet filter makes filtering decisions on an individual packet basis and does not take into consideration any higher
layer context.
Select one:
True
False
A single device that integrates a variety of approaches to dealing with network-based attacks is referred to as a
Unidentified threa
system.
A packet filtering firewall is typically configured to filter packets going in both directions.
Select one:
True
False
11/22/23, 2:11 PM
Chapter 9 Quiz: Attempt review
https://courses.campbellsville.edu/mod/quiz/review.php?attempt=2763441&cmid=4283726
3/3
Question
8
Complete
10.00 points out of 10.00
Question
9
Complete
0.00 points out of 10.00
Question
10
Complete
10.00 points out of 10.00
Snort Inline adds three new rule types: drop, reject, and
Sdrop
.
The firewall follows the classic military doctrine of
defense in depth
because it provides an additional layer of defense.
The primary role of the personal firewall is to deny unauthorized remote access to the computer.
Select one:
True
False
◄ Previous activity
Jump to...
Next activity
▶
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help