Chapter 9 Quiz_ Attempt review

pdf

School

Trine University *

*We aren’t endorsed by this school

Course

5063

Subject

Information Systems

Date

Nov 24, 2024

Type

pdf

Pages

3

Uploaded by AmbassadorPencilRedPanda44

Report
11/22/23, 2:11 PM Chapter 9 Quiz: Attempt review https://courses.campbellsville.edu/mod/quiz/review.php?attempt=2763441&cmid=4283726 1/3 Started on Tuesday, November 7, 2023, 2:52 AM State Finished Completed on Tuesday, November 7, 2023, 2:57 AM Time taken 4 mins 29 secs Grade 70.00 out of 100.00 Question 1 Complete 0.00 points out of 10.00 Question 2 Complete 10.00 points out of 10.00 Question 3 Complete 10.00 points out of 10.00 The countermeasure to tiny fragment attacks is to discard packets with an inside source address if the packet arrives on an external interface. Select one: True False A DMZ is one of the internal firewalls protecting the bulk of the enterprise network. Select one: True False The firewall can protect against attacks that bypass the firewall. Select one: True False
11/22/23, 2:11 PM Chapter 9 Quiz: Attempt review https://courses.campbellsville.edu/mod/quiz/review.php?attempt=2763441&cmid=4283726 2/3 Question 4 Complete 10.00 points out of 10.00 Question 5 Complete 10.00 points out of 10.00 Question 6 Complete 0.00 points out of 10.00 Question 7 Complete 10.00 points out of 10.00 The firewall may be a single computer system or a set of two or more systems that cooperate to perform the firewall function. Select one: True False A traditional packet filter makes filtering decisions on an individual packet basis and does not take into consideration any higher layer context. Select one: True False A single device that integrates a variety of approaches to dealing with network-based attacks is referred to as a Unidentified threa system. A packet filtering firewall is typically configured to filter packets going in both directions. Select one: True False
11/22/23, 2:11 PM Chapter 9 Quiz: Attempt review https://courses.campbellsville.edu/mod/quiz/review.php?attempt=2763441&cmid=4283726 3/3 Question 8 Complete 10.00 points out of 10.00 Question 9 Complete 0.00 points out of 10.00 Question 10 Complete 10.00 points out of 10.00 Snort Inline adds three new rule types: drop, reject, and Sdrop . The firewall follows the classic military doctrine of defense in depth because it provides an additional layer of defense. The primary role of the personal firewall is to deny unauthorized remote access to the computer. Select one: True False ◄ Previous activity Jump to... Next activity
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help