• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

In general which of the following is not DMZ?

Database

VLAN physically divides the workstations and hosts into different LANS?




T or F

False

A VLAN switch is a IP layer device?




T or F

False

In IPSEC, encapsulating security payload (ESP) can provide integrity protection?




T or F

True

To secure the communication between two subnetworks, which mode should we use in IPSEC?

Tunnel mode

In IPSec, the encryption algorithm and key information are

Stored in Security Associations Database

In IPSec, we use SPI (security parameter index) to locate a Security Association (SA)




T or F

True

We use tunnel mode IPSEC to provide host-to-host security protection.




T or F

False

A SPD (security policy database) indicates the control policies of the incoming/outgoing traffic. Which of the following actions is not listed in the database?

Hold and control

The TLS/SSL, the client and server negotiate the session key through?

Handshake protocol

We mainly use an X.509 digital certificate to get the ?

Subjects public key

The X.509 certificate can be signed by anyone?




T or F

False

A X.509 certificate has the certificate authority's signature




T or F

True

Which of the following services will NOT be provided by TLS/SSL?

Intrusion detection

In SSL, the client uses the servers private key to encrypt the data.




T or F

False

All VPN are built on IPsec




T or F

False

Which of the following is not part of Botnets?

Firewall

In DDoS attacks, normally the ___ send malicious packages to the victim directly.

Zombies or bots

In a distributed denial of service (DDoS) attack, the attacker aims to comprise ___

Availability

A stateless firewall filters each packet based on the information contained in the packet. Which of the following will NOT be checked by the stateless firewall?

Application data

In DDoS attacks, the attacker tries to steal valuable information from a victim?




T or F

False

IP spoofing is a common technique in almost all forms of DDoS attacks.




T or F

True

Stateless firewall filters each packet based on the connection context between the sender and receiver.




T or F

False

The stateless and statefull firewalls are exactly the same since they both filter the packets based on the IP address, protocol and port numbers.




T or F

False

In ipsec every package needs to carry the key information?




T or F

False