100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ISDS 418 Final Exam questions with 100% correct answers $17.99   Add to cart

Exam (elaborations)

ISDS 418 Final Exam questions with 100% correct answers

 5 views  0 purchase
  • Course
  • ISDS
  • Institution
  • ISDS

ISDS 418 Final Exam questions with 100% correct answers

Preview 3 out of 16  pages

  • October 14, 2024
  • 16
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ISDS
  • ISDS
avatar-seller
kirus27
ISDS 418 Final Exam

Node - correct answer ✔✔A single, conceptual computing device connected to the network



Host - correct answer ✔✔The actual physical computing device involved in a node



Link - correct answer ✔✔A connection between two hosts



What characteristics make networks vulnerable to attack? - correct answer ✔✔- Anonymity



- Many points of attack



- Resource and workload sharing



- System complexity



- Unknown boundary



Port scanner - correct answer ✔✔a software program that is designed to examine one or more IP
addresses and record which ports are open and which known vulnerabilities are present



Who uses a port scanner? - correct answer ✔✔- A network administrator or security analyst can use a
port scanner to evaluate the strengths and weaknesses of a network



- An attacker can also use a port scanner to assess how or at which point to attack a network



- High-quality port scanners are freely available to both white-hats and black-hats alike!

,segmented network architecture - correct answer ✔✔



How is segmented network more secure? - correct answer ✔✔- One way of controlling threats from port
scanners is to implement a segmented network architecture



- In a segmented network, many hosts belong to protected sub-networks that are not directly visible to
the outside world



What is a firewall? - correct answer ✔✔- A firewall is a device (hardware, software, or both) that is
designed to:

- Prevent unauthorized outside users from accessing a network or workstation

- Prevent inside users from transmitting sensitive information or accessing unsecured resources



How does a firewall work? - correct answer ✔✔- A firewall protects a local network (or sub-network)
from the outside global network

- Firewalls work by inspecting each inbound or outbound packet and determining whether it should be
blocked or allowed to pass through

- Firewalls keep "bad things" out, but can also be used to keep sensitive data in



What are the two main default firewall security policies? - correct answer ✔✔1. Default permit:

- Anything that is not expressly prohibited is allowed



2. Default deny:

- Anything that is not expressly allowed is denied



packet filtering gateways - correct answer ✔✔- Also known as a screening router, a type of firewall that
regulates network boundary access by:

- Examining the source and/or destination IP address for each packet

- Examining the type of transport protocol for each packet (e.g., HTTP, FTP, telnet, etc.) -- This is called
Port filtering

, - Packets that are not acceptable in light of the firewall's security policy are discarded



- Packet filtering gateways are the simplest and often most effective type of firewall



Stateful Inspection Firewall - correct answer ✔✔- considers the state or context of the packets that it
evaluates. It "remember" the network activities of hosts



- to identify hosts that represent a threat by accumulating evidence against them

- If the negative evidence against a host exceeds a threshold established by the firewall's security policy,
the host can be blocked



Application Proxy Gateways - correct answer ✔✔- also known as bastion host, a type of firewall that runs
pseudo-applications which mimic the proper behavior of real applications

- These pseudo-applications examine the contents of the packets traveling between applications inside
the network boundary and application users outside of the network boundary



- The application proxy gateway can filter out unacceptable protocol commands or other malformed
commands while they are in transit between an application and a user

- Command filtering is bidirectional



Circuit-Level Gateways - correct answer ✔✔- a type of firewall that enables one network to become a
virtual extension of another network



- Incoming / outgoing packets are examined to determine whether they are being sent to / received from
the target network

- If so, packets are decrypted or encrypted as necessary

- If not, packets are routed through the "normal" firewall

- Circuit-level gateways can be used to implement virtual private networks (VPNs)



What is network address translation? - correct answer ✔✔- hide the structure of an internal network
from the outside world

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller kirus27. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (0)
  Add to cart