DCOM 211 Midterm Questions and Correct Answers | Latest Update
0 view 0 purchase
Course
DCOM 211
Institution
DCOM 211
Firewalls can not protect data within an organization between departments or subnets.
Firewalls only protect the data from internet attacks
False
An example of a Host-Based Firewall.
Microsoft Internet Connection Firewall (ICF
A SYN attack is a _________ attack type
Distributed D...
Best Grades | Must Pass | Latest Update | Correct Answers | 2024/ 2025
DCOM 211 Midterm Questions and Correct
Answers | Latest Update
Firewalls can not protect data within an organization between departments or subnets.
Firewalls only protect the data from internet attacks
False
An example of a Host-Based Firewall.
Microsoft Internet Connection Firewall (ICF
A SYN attack is a _________ attack type
Distributed Denial of Service (DDOS)
Determination of a firewall requirement would be
to perform an Annual Loss Expectancy (ALE)
A vulnerability that is exploited the same day it was discovered.
zero-day attack
An access control policy enforcement point.
~ 1 ~ for inquiry mail me @ supergrades12@gmail.com
, Best Grades | Must Pass | Latest Update | Correct Answers | 2024/ 2025
Firewall
Sequence numbers, checksums, data flags, payload information, etc...
Packet header information
Connection less session
Internet Control Message Protocol (ICMP).
A firewall would permit malware to succesfully pass through to the production network when
attached to "permitted" data.
True
The 1st step in data protection would be to determine the network flow direction.
True
Dependant upon the type of firewall, actions taken by firewalls include: (Choose all that
apply)
Block Packets
Allow Packets
~ 1 ~ for inquiry mail me @ supergrades12@gmail.com
, Best Grades | Must Pass | Latest Update | Correct Answers | 2024/ 2025
Restrict Packet
Motives are solely isolated to a cybe attacker who desires to compormise a system whether it
is a targeted system or untargeted system
False
Network Address Translation (NAT) : (Choose all that apply)
Allows use of "Private" Addresses on the internal network. Large internal
networks can operate with only a few "Public" Addresses
No need to re-number internal networks, if set up per IETF RFC-1918
One-to-One or Many-to-One translation
The firewall can "translate" internal "Private" Addresses to "Public" Addresses before sending
them out to the Internet, "hiding" the internal addresses
Advantages of Circuti Proxy Firewalls: (Choose all that apply):
More control than a Packet Filter
~ 1 ~ for inquiry mail me @ supergrades12@gmail.com
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Examify. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.