Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which of the following should normally be the first rule in a firewall rulebase? a ) stealth rule b ) bastion rule c ) cleanup

Which of the following should normally be the first rule in a firewall rulebase?
a) stealth rule
b) bastion rule
c) cleanup rule
d) destination rulc
__________ firewalls maintain data about open connections to ensure that packets are part of a legitimate connection.
a) Stateful inspection
b) Egress inspection
c) Packet filtering
d) Handshaking
Which of the following is one of the best tools in defending against a social engineering attack?
a) Policies
b) Peopie
c) Systems
d) Network
Early firewalls used _______ to examine packets.
a) stateful inspection
b) egress inspection
c) packet filtering
d) handshaking
27 From a security perspective, a(n)_________ masks the identity of a client and limits the usefulness of network sniffing.
a) router
b) proxy server
c) switch
d) firewall
Which of the following audit tools is used to identify rogue systems and services?
a) checklists
b) integrity checking
c) vulnerability scanners
d) IP/port scanners
A common technique often used in high security environments to establish an unalterable paper trail for log files is called________.
a) remote logging
b) printer logging
c) security logging
d) cryptographic technology

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

T Sql Window Functions For Data Analysis And Beyond

Authors: Itzik Ben Gan

2nd Edition

0135861446, 978-0135861448

More Books

Students also viewed these Databases questions