Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Could you make a comment about below questions and let me find answers to them? Thank you Q 1 Consider a multi-level security (MLS) framework

Could you make a comment about below questions and let me find answers to them? Thank you

Q 1 Consider a multi-level security (MLS) framework with 5 levels, with Level 5 being the highest and Level 1 being the IC7N8Sl A user at Level 3 can do which of the following actions:

a) Read and write data to all levels

b) Read from level 2 but not write lo Level 4

c) Write to level 5 but not read from Level 4

d) Both b and c

----------------------------------------

Q 2 Larger-sized intrusion detection setups usually comprise of

a) A single fast IDS device sitting at the edge of a monitored network

b) A series of distributed sensors networked managed by a central controller

c) A firewall device paired with an edge/access router

d) A set of appl 1caoon gateways monitoring/controlling mpuVoutput behaviors

----------------------------------------

Q 3 Cross-domain solutions (CDS) provide

a) Information transfer between domains with similar security levels

b) Are strictly hardware-based systems for IP packet header analysis

c) Have their origins m the open scientific research community

e) None of the above

--------------------------------------

Q 4 Within the context of network intrusion detection, what is a signature?

a) An electronic signature used to authenticate a user's identity in the network

b) A known attack-definition pattern

c) An encryption key for user 1denbficabon

d) A typical normal baseline behavior

e) None of the above

--------------------------------------

Q 5 Network firewall systems

a) Operate at the networking layer (Layer 3 m OSI model)

b) Are very effective for stopping denial of service (DoS) attacks

c) Can operate alongside mtrus1on detection systems (IDS)

d) Both a and c

e) None of the above

-------------------------------------

Q 6 Directly attached storage (DAS) systems

a) Directly attach storage disks to the LAN network

b) Provide the fastest access to information

c) Enforce encryption a data for security needs

d) All of the above

e) None of the above

----------------------------------

Q 7 Which statement below is false?

a) A DMZ is located behind the firewall/edge router

b) Any system on a DMZ can be compromised because it is accessible from outside

c) A DMZ is an isolated network segment

d) A DMZ setup requires packet filtering

e) None of the above

---------------------------------------

Q 8 Network attached storage (NAS)

a) Provides file-level access

b) Provides a unified central view of storage

c) Places storage devices directly on corporate intranets

d) All of the above

e) Both a and c

-------------------------------------

Q 9 If a firewall device drops all packets destined for a particular TCP port number

a) It can be a stateless firewall

b) It can be a stateful firewall

c) Both a and b

d) Neither a nor b

---------------------------------------

Q 10 Within the context of intrusion detection systems (IDS)

a) The detection rate is equal to the number of actual attacks

b) The false alarm rate is equal to the number of erroneous alerts (non-events)

c) Both a and b

d) Neither a nor b

---------------------------------------

Q 11 directly attached storage (DAS) setups

a) Provide a unified view of all data/storage

b) Achieve much faster data/file transfer rates than NAS and SAN systems

c) Require special servers to provide access to user files

d) None of the above

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Programming With Visual Basic .NET

Authors: Carsten Thomsen

2nd Edition

1590590325, 978-1590590324

More Books

Students also viewed these Databases questions

Question

3. Develop a case study.

Answered: 1 week ago