Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
In general which of the following is not DMZ? |
Database |
|
VLAN physically divides the workstations and hosts into different LANS? T or F |
False |
|
A VLAN switch is a IP layer device? T or F |
False |
|
In IPSEC, encapsulating security payload (ESP) can provide integrity protection? T or F |
True |
|
To secure the communication between two subnetworks, which mode should we use in IPSEC? |
Tunnel mode |
|
In IPSec, the encryption algorithm and key information are |
Stored in Security Associations Database |
|
In IPSec, we use SPI (security parameter index) to locate a Security Association (SA) T or F |
True |
|
We use tunnel mode IPSEC to provide host-to-host security protection. T or F |
False |
|
A SPD (security policy database) indicates the control policies of the incoming/outgoing traffic. Which of the following actions is not listed in the database? |
Hold and control |
|
The TLS/SSL, the client and server negotiate the session key through? |
Handshake protocol |
|
We mainly use an X.509 digital certificate to get the ? |
Subjects public key |
|
The X.509 certificate can be signed by anyone? T or F |
False |
|
A X.509 certificate has the certificate authority's signature T or F |
True |
|
Which of the following services will NOT be provided by TLS/SSL? |
Intrusion detection |
|
In SSL, the client uses the servers private key to encrypt the data. T or F |
False |
|
All VPN are built on IPsec T or F |
False |
|
Which of the following is not part of Botnets? |
Firewall |
|
In DDoS attacks, normally the ___ send malicious packages to the victim directly. |
Zombies or bots |
|
In a distributed denial of service (DDoS) attack, the attacker aims to comprise ___ |
Availability |
|
A stateless firewall filters each packet based on the information contained in the packet. Which of the following will NOT be checked by the stateless firewall? |
Application data |
|
In DDoS attacks, the attacker tries to steal valuable information from a victim? T or F |
False |
|
IP spoofing is a common technique in almost all forms of DDoS attacks. T or F |
True |
|
Stateless firewall filters each packet based on the connection context between the sender and receiver. T or F |
False |
|
The stateless and statefull firewalls are exactly the same since they both filter the packets based on the IP address, protocol and port numbers. T or F |
False |
|
In ipsec every package needs to carry the key information? T or F |
False |