quiz11

pdf

School

South Texas College *

*We aren’t endorsed by this school

Course

2435

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

3

Uploaded by DoctorMetal770

Report
View Assessment Quiz 11 Quiz Content Question 1 10 Points Which of the following is not one of the AAA services provided by RADIUS and TACACS+? Authentication Authorization Administration Accounting Question 2 10 Points Who is responsible for the security of hardware on which a public cloud runs? The cloud customer It depends Both the cloud customer and the cloud provider The cloud provider Question 3 10 Points At what layer of the OSI model do proxy servers operate? Layer 3 Layer 2 Layer 7 Layer 4 Question 4 10 Points What information in a transmitted message might an IDS use to identify network threats? Signature 24 minutes remaining 0 OF 10 QUESTIONS REMAINING
View Assessment FIM Port mirroring ACL Question 5 10 Points Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited? Separation of duties Principle of least privilege Shared responsibility model Defense in depth Question 6 10 Points Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address? access-list acl_2 deny tcp any any access-list acl_2 permit https any any access-list acl_2 deny tcp host 2.2.2.2 host 3.3.3.3 eq www access-list acl_2 permit icmp any any Question 7 10 Points Active Directory and 389 Directory Server are both compatible with which directory access protocol? LDAP RADIUS Kerberos AD DS Question 8 10 Points Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic? Destination IP address SYN flags Application data ICMP message
View Assessment Question 9 10 Points Which device would allow an attacker to make network clients use an illegitimate default gateway? RA guard DHCP server Proxy server Network-based firewall Question 10 10 Points Which policy ensures messages are discarded when they don’t match a specific firewall rule? Implicit allow Explicit deny Explicit allow Implicit deny
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help