Question
Could you make a comment about below questions and let me find answers to them? Thank you Q 1 Consider a multi-level security (MLS) framework
Could you make a comment about below questions and let me find answers to them? Thank you
Q 1 Consider a multi-level security (MLS) framework with 5 levels, with Level 5 being the highest and Level 1 being the IC7N8Sl A user at Level 3 can do which of the following actions:
a) Read and write data to all levels
b) Read from level 2 but not write lo Level 4
c) Write to level 5 but not read from Level 4
d) Both b and c
----------------------------------------
Q 2 Larger-sized intrusion detection setups usually comprise of
a) A single fast IDS device sitting at the edge of a monitored network
b) A series of distributed sensors networked managed by a central controller
c) A firewall device paired with an edge/access router
d) A set of appl 1caoon gateways monitoring/controlling mpuVoutput behaviors
----------------------------------------
Q 3 Cross-domain solutions (CDS) provide
a) Information transfer between domains with similar security levels
b) Are strictly hardware-based systems for IP packet header analysis
c) Have their origins m the open scientific research community
e) None of the above
--------------------------------------
Q 4 Within the context of network intrusion detection, what is a signature?
a) An electronic signature used to authenticate a user's identity in the network
b) A known attack-definition pattern
c) An encryption key for user 1denbficabon
d) A typical normal baseline behavior
e) None of the above
--------------------------------------
Q 5 Network firewall systems
a) Operate at the networking layer (Layer 3 m OSI model)
b) Are very effective for stopping denial of service (DoS) attacks
c) Can operate alongside mtrus1on detection systems (IDS)
d) Both a and c
e) None of the above
-------------------------------------
Q 6 Directly attached storage (DAS) systems
a) Directly attach storage disks to the LAN network
b) Provide the fastest access to information
c) Enforce encryption a data for security needs
d) All of the above
e) None of the above
----------------------------------
Q 7 Which statement below is false?
a) A DMZ is located behind the firewall/edge router
b) Any system on a DMZ can be compromised because it is accessible from outside
c) A DMZ is an isolated network segment
d) A DMZ setup requires packet filtering
e) None of the above
---------------------------------------
Q 8 Network attached storage (NAS)
a) Provides file-level access
b) Provides a unified central view of storage
c) Places storage devices directly on corporate intranets
d) All of the above
e) Both a and c
-------------------------------------
Q 9 If a firewall device drops all packets destined for a particular TCP port number
a) It can be a stateless firewall
b) It can be a stateful firewall
c) Both a and b
d) Neither a nor b
---------------------------------------
Q 10 Within the context of intrusion detection systems (IDS)
a) The detection rate is equal to the number of actual attacks
b) The false alarm rate is equal to the number of erroneous alerts (non-events)
c) Both a and b
d) Neither a nor b
---------------------------------------
Q 11 directly attached storage (DAS) setups
a) Provide a unified view of all data/storage
b) Achieve much faster data/file transfer rates than NAS and SAN systems
c) Require special servers to provide access to user files
d) None of the above
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started