Purchase Solution

IT Architecutre: Basic Question & Answers

Not what you're looking for?

Ask Custom Question

1. Name two advantages of Stateful Inspection Packet Filtering Routers.

2. Name two advantages that firewalls add to a network

3. Name two advantages of the Dual Homed Bastion Host firewall architecture

4. Name two advantages of the Screened Subnet or DMZ Firewall architecture

5. You just discovered a knowledgeable insider has planted a logic bomb in your shipping applications and is demanding $50,000,000 to disable it. What do you do

Choose the best answer:

6. The three devices most commonly used for perimeter protection are:
A) Application servers, firewalls, and databases
B) Routers, Firewalls, and IDSs
C) Web server, application server, database serv
D) Router, Web server, Firewall

7. What are the two types of detection that an IDS can provide?
A) Misuse and anomaly
B) Denial of service detection and HTTP attacks
C) Fragment and offset
D) ICMP and TCP

8. The three things that must be considered for the planning and implementation of security controls are:
A- Threats, assets, and business objectives
B- Threats, vulnerabilities, and risks
C- Vulnerabilities, secret keys, and exposures
D- Exposures, threats, and countermeasures

9. Separation of Duties is based on which principle?
A-An operator does not know more about the system than the minimum required to do the job
B-Two operators are required to work in tandem to perform a task
C-Operator duties are rotated frequently
D- Operators have different duties to prevent one person working alone to compromise the system

10. An orchestrated attack on an Internet site intended to disrupt communications is called
A- Blended attack
B- Coordinated attack
C- Denial of Service attack
D- Penetration test.

Purchase this Solution

Solution Summary

Solution answers some basic questions related to IT Architecture & Security

Solution Preview

1)

1. The packet-filtering rules allow a router to permit or deny traffic based on a specific service.

2. It can prevent Denial-of-service attacks.

3. It can keep track of state of network connections, so only packets matching a known connection state will be allowed by the router.

2)

1. A properly-configured ...

Purchase this Solution


Free BrainMass Quizzes
Java loops

This quiz checks your knowledge of for and while loops in Java. For and while loops are essential building blocks for all Java programs. Having a solid understanding of these constructs is critical for success in programming Java.

Basic UNIX commands

Use this quiz to check your knowledge of a few common UNIX commands. The quiz covers some of the most essential UNIX commands and their basic usage. If you can pass this quiz then you are clearly on your way to becoming an effective UNIX command line user.

Excel Introductory Quiz

This quiz tests your knowledge of basics of MS-Excel.

Basic Computer Terms

We use many basic terms like bit, pixel in our usual conversations about computers. Are we aware of what these mean? This little quiz is an attempt towards discovering that.

Javscript Basics

Quiz on basics of javascript programming language.