Data warehouses and employee privacy

Assignment Help Database Management System
Reference no: EM13766544

Question 1. What should a company consider installing on the network perimeter to prevent direct connections between the internal network and the Internet to help protect its data warehouses and employee privacy?

Router
VPN server
ICMP monitor
Proxy server

Question 2. The Cisco PIX line of products is best described as which of the following?

software firewall
PC with firewall installed
firewall appliance
VPN gateway

Question 3. Which of the following is a typical drawback of a free firewall program?

cannot monitor traffic in real time
oversimplified configuration
have centralized management
more expensive than hardware firewalls

Question 4. Which of the following is an advantage of hardware firewalls?

not scalable compared to software firewalls
not dependent on a conventional OS
less expensive than software firewalls
easy to patch

Question 5. What are the two standard ports used by FTP along with their function?

UDP 23 control, TCP 20 data
UDP 20 data, TCP 21 control
TCP 21 control, TCP 20 data
TCP 23 data, TCP 21 control

Question 6. Which of the following is true about private IP addresses?

they are assigned by the IANA
they are not routable on the Internet
they are targeted by attackers
NAT was designed to conserve them

Question 7. Which type of security device can speed up Web page retrieval and shield hosts on the internal network?

caching firewall
proxy server
caching-only DNS server
DMZ intermediary

Question 8. Which of the following is true about a dual-homed host?

serves as a single point of entry to the network
its main objective is to stop worms and viruses
uses a single NIC to manage two network connections
it is used as a remote access server in some configurations

Question 9. Which type of translation should you use if you need 50 computers in the corporate network to be able to access the Internet using a single public IP address?

one-to-one NAT
port address translation
one-to-many NAT
DMZ proxy translation

Question 10. Which of the following is a disadvantage of using a proxy server?

shields internal host IP addresses

slows Web page access
may require client configuration
can't filter based on packet content

Question 11. Which of the following is a type of VPN connection?

site-to-server
client-to-site
server-to-client
remote gateway

Question 12. Which of the following is NOT a factor a secure VPN design should address?

Encryption
Authentication
Nonrepudiation
performance

Question 13. Which IPsec component authenticates TCP/IP packets to ensure data integrity?

AH
ESP
IKE
ISAKMP

Question 14. Which of the following is NOT an essential element of a VPN?

VPN server
Tunnel
VPN client
authentication server

Question 15. Which of the following is NOT true about a hardware VPN?

should be the first choice for fast-growing networks
can handle more traffic than software VPNs
have more security vulnerabilities than software VPNs
create a gateway-to-gateway VPN

Question 16. Which of the following is true about the Internet?

it is the same as the World Wide Web
it was established in the mid-1960s
it was developed by a network of banks and businesses
it was originally built on an extended star topology

Question 17. Which of the following is a highly secure public facility in which backbones have interconnected data lines and routers that exchange routing and traffic data?

ISP
POP
NAP
NSF

Question 18. What makes IP spoofing possible for computers on the Internet?

network address translation
the lack of authentication
the 32-bit address space
the DNS hierarchy

Question 19. What type of attack displays false information masquerading as legitimate data?

Java applet
Phishing
Buffer overflow
SQL injection

Question 20. Which of the following best describes ROI?

the chance that a threat will result in lost money
how long before an investment will pay for itself
the cost of mitigating a threat

the benefits of setting security priorities

Question 21. What is considered the first step in formulating a security policy?

risk analysis
elimination of threats
risk reduction
system monitoring

Question 22. Which of the following best describes a Monte Carlo simulation?

a technique for simulating an attack on a system
a formula that estimates the cost of countermeasures
a procedural system that simulates a catastrophe
an analytical method that simulates a real-life system for risk analysis

Question 23. Which of the following is a security-related reason for monitoring and evaluating network traffic?

to determine if your IDPS signatures are working well
to create substantial data to analyze
to optimize your router and switch protocols
to see how many files employees download form the Internet

Question 24. Which of the following is NOT typically an aspect of a security event management program?

monitoring events
managing IDPS firmware
managing data from sensors
managing change

Question 25. What should an outside auditing firm be asked to sign before conducting a security audit?

subpoena

nondisclosure agreement
search and seizure contract
social engineering covenant

Reference no: EM13766544

Questions Cloud

Bromination electroscopic aromatic substitution : What are the major products of the following bromination electrophilic aromatic substitution reactions? a) phenol with 1 equivalent of Br2 b) anisole with 1 eq. Br2 c) diphenyl ether with 1 eq. Br2 d) acetanilide with 1 eq. Br2 e) 4-bromophenol with ..
Postpone recording the transaction : Does your client have a liability that should be recorded at December 31? Discuss. For what possible reason(s) might your client wish to postpone recording the transaction?
Steps in the calculations to receive credit : My motorbike that didn't make the move when I came to CA. Empty (without the fuel) it weighs 370 lbs, and the tank has a capacity of 14.5 L. Assume that the fuel it takes has a density of 0.750 g/cm3, what is the weight of the bike in kg after fuelin..
Dependent and independent variables : What are the dependent and independent variables in this problem? Explain. Use the least-squares method to find the regression coefficients (show workings). State the simple linear regression equation.
Data warehouses and employee privacy : What should a company consider installing on the network perimeter to prevent direct connections between the internal network and the Internet to help protect its data warehouses and employee privacy
Compare two critical approaches and how are they different : Describe each critical approach in detail. Compare and/or contrast the two critical approaches. How are they different and similar?
Perspectives of moral philosophy : Analyze Kohlberg's stages of moral development and determine which stage best describes the majority of your coworkers.
Analyzing the evidence and an unadulterated sample : A suspected case of food tampering involving a soft drink containing FD&C Yellow Dye No. 5 has occurred. It is suspected that part of the contents was dumped and a household cleaner was added to it. Explain how one might use spectrophotometry to prov..
System analyst and design-business process-functional model : Advanced Business Systems (ABS) is a consulting and staffing company providing specialized staffing and consulting services to clients in a variety of different industries. It has offices in major U.S. metro areas and has ongoing relationships wit..

Reviews

Write a Review

Database Management System Questions & Answers

  Implement that entity as a database table with two subtypes

Implement that entity as a database table with two subtypes, Games and Movie.

  Compare two non-sequential file structure models

Compare the two non-sequential file structure models. What advantages does the first one have over the second and what advantages does the second have over the first?

  Explain how to create query in access query wizard

Describe how to create a query in Access Query Wizard equilvant to the query: SELECT first, last, department, hours FROM payroll WHERE hours>.

  Describe the different operations of relational algebra

Describe relationships with the example. Also illustrate degree of relationship for that example. Describe the different operations of relational algebra with suitable example each.

  Background adventure works cycles the fictitious company on

background adventure works cycles the fictitious company on which the adventureworks sample databases are based is a

  What difficulties did you encountered and how did you

write a 200- to 300-word short-answer response for the followingwhat difficulties did you encountered and how did you

  Could a relation be stored as a sequential file

Suppose a sequential file contains 50,000 records, and 5 milliseconds are required to interrogate an entry. How long should we expect to wait when retrieving a record from the middle of the file?

  Create a new test02 class

Write a toString method that will return a String containing all the relevant data for each of your objects.

  Create a use case based on relating functional requirements

Describe (in a one to two (1-2) page narrative) a use case, complete with typical and alternate courses, that documents the event of a bank customer withdrawing money from an ATM.

  Explain the following elements of network performance

There is a growing requirement to meet or exceed expectations of end users and applications communicating over a packet-switched network. In order to fulfil this requirement, different techniques are used to improve the QoS.

  Which method would be efficient for planning proactive

Dual Assessment of Data Quality in Customer Databases,Journal of Data and Information Quality (JDIQ), Volume 1 Issue 3, December 2009, Adir Even, G. Shankaranarayanan.

  Benefits of using databases and dbmss

Assignment: Research organizational benefits of using databases and DBMS's. Supplement your research with a review of your lessons. Post a response to the discussion board: Respond to the following statements and, if appropriate, include personal e..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd