Three widely used authentication methods, or "factors" are Correct Ans-"something a
supplicant knows
something a supplicant has
something a supplicant is"
A policy of assigning local non-routable IP addresses (from a reserved subnet) to each
corporate internet device, and then employing network address translation to provide
routable IP addresses to specific devices on an as-needed basis is called Correct Ans-
dynamic IP addresses
A packet-filtering firewall is an intelligent packet selecting hub, router or switch which can
selectively allow or deny ___ on an individual basis Correct Ans-packets
____ packet filtering firewalls detect patterns in current network traffic and automatically
update firewall rules tables Correct Ans-dynamic
The process of selecting a proper firewall for the needs of a given organization can become
quite complex, and may benefit from the ___ process in order to assess the expected
monetary impact of various options. Correct Ans-cost / benefit analysis
Though in casual use we refer to a fully-specified IP address as a host address, in reality it
identifies a specific _______ _______ _______ (3 words). Correct Ans-network interface
controller
, CSE 4471 Final Study Guide Questions and Answers
A _______ _______ (2 words) is simply an identifier that a software application or service has
"bound" to in order to indicate to the operating system that packets containing that identifer
should be delivered to the binding application or service. Correct Ans-port number
_______ _________ (2 words) is the selective method by which systems specify who may use
a particular resource and how they may use it. Correct Ans-Access control
A(n) _______ _______ _______ (3 words) is a specification of an organization's information
asset, the users who may access and use it, and their rights and privileges for using the asset.
Correct Ans-access control list
Interestingly, the degree of acceptance (by users) of biometric authentication methods is
often directly opposite their degree of _______. Correct Ans-effectiveness
IDPS Best suited to defend against a footprinting attack Correct Ans-NIDPS
IDPS best suited to defend against an SQL injecttion attack Correct Ans-AIDPS
IDPS type best suited to defend against a USB-delivered trojan horse attack Correct Ans-
HIDPS
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TheeGrades. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.99. You're not tied to anything after your purchase.