Professional Documents
Culture Documents
COM)
Points: 21/25
a) Buffer overflows
d) Backdoor
a) Analysic Engine
b) Event provider
c) Zone system
d) Alert Database
https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 1/8
12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.COM)
a) anomaly detection
b) signature based misuse
c) stack based
d) zone based
a) Zone based
b) Host based
c) Network based
d) Level based
https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 2/8
12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.COM)
d) None of these
https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 3/8
12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.COM)
a) They are integrated closely with the TCP/IP stack and watch packets
b) The host operating system logs in the audit information
choke point
control unit
Auditing point
access point
https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 4/8
12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.COM)
Demilitarized zone
Data manufacturing zone
13. Only authorized traffic ,as defined by the local--------- policy ,is allowed to pass
through a firewall. *
network
FTP
security
connection
14. Before you start to design your firewall ,it is important to study – *
Environment
Recovery area
pc network
https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 5/8
12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.COM)
Two
Three
Four
Five
16.
PFF means --------------- *
none of above
17. A stateful packet filtering firewall looks at each packet and applies rules or ----
-------------
*
checks
contexts
test
tracks
https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 6/8
12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.COM)
18. A circuit level firewall doesn’t simply allow or disallow packets but also
determines wheather the connection between both ends is valid--- *
True
False
control
avoid
Pass
analyse
Proxy firewalls
packet firewalls
policy firewalls
pass firewalls
https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 7/8
12/17/22, 10:19 AM Introduction to Cyber Security III (2022 -23 PG - SY M.COM)
21. Circuit level firewalls are working between the two layers --- *
Application-Presentation layer.
Program
Printer
network
software
WAN
LAN
MAN
None
https://forms.office.com/pages/responsepage.aspx?id=-bbi5YTAmECFB51fbNIY7HAztW_FesNIjEIbMU0agSBUOFVNNkdHNFgxUjdQUVJYWTF… 8/8