quiz11
pdf
keyboard_arrow_up
School
South Texas College *
*We aren’t endorsed by this school
Course
2435
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
3
Uploaded by DoctorMetal770
View Assessment
Quiz 11
Quiz Content
Question 1
10 Points
Which of the following is not one of the AAA services provided by RADIUS and TACACS+?
Authentication
Authorization
Administration
Accounting
Question 2
10 Points
Who is responsible for the security of hardware on which a public cloud runs?
The cloud customer
It depends
Both the cloud customer and the cloud provider
The cloud provider
Question 3
10 Points
At what layer of the OSI model do proxy servers operate?
Layer 3
Layer 2
Layer 7
Layer 4
Question 4
10 Points
What information in a transmitted message might an IDS use to identify network threats?
Signature
24 minutes remaining
0
OF 10 QUESTIONS REMAINING
View Assessment
FIM
Port mirroring
ACL
Question 5
10 Points
Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited?
Separation of duties
Principle of least privilege
Shared responsibility model
Defense in depth
Question 6
10 Points
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
access-list acl_2 deny tcp any any
access-list acl_2 permit https any any
access-list acl_2 deny tcp host 2.2.2.2 host 3.3.3.3 eq www
access-list acl_2 permit icmp any any
Question 7
10 Points
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
LDAP
RADIUS
Kerberos
AD DS
Question 8
10 Points
Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic?
Destination IP address
SYN flags
Application data
ICMP message
View Assessment
Question 9
10 Points
Which device would allow an attacker to make network clients use an illegitimate default gateway?
RA guard
DHCP server
Proxy server
Network-based firewall
Question 10
10 Points
Which policy ensures messages are discarded when they don’t match a specific firewall rule?
Implicit allow
Explicit deny
Explicit allow
Implicit deny
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help