You are on page 1of 2

CHAPTER1BookQuestionsTacticalPerimeterDefense

1.Anoutsiderneedsaccesstoaresourcehostedonyourextranet.Theoutsiderisa
strangertoyou,butoneofyourlargestdistributorsvouchesforhim.Ifyou
allowhimaccesstotheresource,thisisknownasimplementingTrustedthird
party.
2.Nonrepudiation,Confidentiality,Integrity,Availabilityarecommonsecurity
objectives.
3.Anythingusedinabusinesstaskisanasset.
4.Protectingvulnerabilitiesbeforetheyarecompromised
isthebenefitoflearningtothinklikeahacker.
5. It is written down is the most important characteristic of an effective security goal?

6. They all have flaws or limitations is true about all security components and devices.
7. Everyone is responsible for network security.

8.]Centralizedauthenticationdistinguishesworkgroupsfromclient/server
networks.
9.VPNRemotecontrolistothinclientsasremoteaccessisto?
10.TunnelingandencapsulationtwotermsarecloselyassociatedwithVPNs.
11.VPNrequiredforaccessisadifferencebetweenaDMZandanextranet.
12.Signalpropagationistheprimarysecurityconcernwithwirelessconnections?
13.Singlepointoffailureandbottlenecksareelementsofnetworkdesignhavethe
greatestriskofcausingaDoS.

14.Zerodayisthetypeofthreataretherenocurrentdefenses?
15.Layer2addresscanbefilteredwithMACaddressfilteringandNetworkLayer
addressisatLayer3andisroutableNetworkLayeraddressisatLayer3and
isroutableistrueregardingaLayer2addressandLayer3address.
16.RFC1918addressarenotbenefitsofIPv6?
17.Denyingbydefault,allowingbyexceptionisthemostcommondefaultsecurity
stanceemployedonfirewalls?
18.Examiningtrafficasitleavesanetwork
isegressfiltering
19.MACaddressfilteringisnotafeatureofaproxyserver?
20.AccesstoremediationserversisallowedunderNACifahostislackinga
securitypatch.

You might also like