What is a dmz and what is it used for

Assignment Help Accounting Basics
Reference no: EM13235804

Need Exam satisfied by Due Date

(TCO 5) SubSeven and Back Orifice are examples of what kind of malicious code? 
Virus
Hoax
Worm
Trojan

Question 2. 2. (TCO 5) What is best ensured through the use of encryption

 Accounting
Authentication
Authorization
Confidentiality

Question 3. 3. (TCO 5) All of the following techniques help secure IM communications except _____. 
running a corporate IM server
using a different user name
avoiding file transfers
using encryption

Question 4. 4. (TCO 6) What is not an advantage of decentralized management?
The decentralized model is highly flexible, as changes can be made whenever they are needed.
It does not require a dedicated set of personnel and resources.
Bureaucracy is reduced.
A more consistent approach is ensured, as everyone "does it the same way."

Question 5. 5. (TCO 6) A network administrator wants to be sure that, when users change their passwords, they do not reuse a previous password. What domain password policy will need to be configured? 
Enforce password history
Maximum password age
Minimum password age
Minimum password length

Question 6. 6. (TCO 6) Running Java applets from the Web on your system is considered _____. 
a security risk
not risky
somewhat secure
very secure

Question 7. 7. (TCO 6) Which is more secure? 
Common Gateway Interface (CGI)
Server-side scripting
Third-party scripting
All are equally secure.

Question 8. 8. (TCO 6) One way a user can feel confident that the code being downloaded is from a legitimate vendor and has not been modified is with the implementation of _____. 
SSL
Authenticode
SFTP
HTTPS

Question 9. 9. (TCO 6) SSMTP uses TCP port _____. 
25
110
465
456

Question 10. 10. (TCO 2) HTTPS uses TCP port _____.
433
443
344
434

Question 11. 11. (TCO 2) All of the following are characteristics of a strong password except when it _____.
contains numbers and letters
contains at least eight characters
contains an uncommon dictionary word
contains special characters, such as *%$#@

Question 12. 12. (TCO 8) Which law makes it illegal to develop, produce, and trade any device or mechanism designed to circumvent technological controls used in copy protection? 
The Sarbanes-Oxley Act
The Digital Millennium Copyright Act
The U.S. Digital Signatures Law
The Computer Fraud and Abuse Act

Question 13. 13. (TCO 4) Which of the following is not one of the three forms of trust models? 
Hybrid
Star
Peer-to-peer
Hierarchical

Question 14. 14. (TCO 4) Which of the following reasons is appropriate for a certificate suspension rather than for revocation? 
All the keys are compromised.
Changed affiliation
An extended vacation
The certificate is no longer needed, but no reason exists to suspect that it has been compromised.

Question 15. 15. (TCO 2) PGP uses _____.
private-key encryption
asymmetric encryption
symmetric encryption
anomalous encryption

Question 16. 16. (TCO 2) HTTPS uses port _____.
80
8080
443
433

Question 17. 17. (TCO 3) Which Transport Layer protocol is connection oriented?
UDP
TCP
IP
ICMP

Question 18. 18. (TCO 3) Which of the following is the term that indicates a hostile activity that does not match an IDS signature and, therefore, goes undetected? 
Detection failure
False alert
False negative
False positive

Question 19. 19. (TCO 3) Packet delivery to distant systems is usually accomplished by the use of _____.
MAC addresses
domain names
IP addresses
ARP protocol

Question 20. 20. (TCO 3) A network that lies completely inside the trusted area of a network and is under the security control of the system and network administrators is referred to as the _____. 
DMZ
Intranet
Extranet
Internet

Question 21. 21. (TCO 3) A logical implementation of a LAN that allows computers connected to different physical networks to act and communicate as if they are on the same physical network is referred to as a _____.
DMZ
VLAN
Extranet
Tunnel

Question 22. 22. (TCO 6) You are building a small network in an office. You need to connect two different network segments that have different network addresses. What device will you use to connect them? 
A hub
A router
A switch
A server

Question 23. 23. (TCO 6) A hub operates at _____. 
Layer 1, the Physical Layer
Layer 2, the Data Link Layer
Layer 2, the MAC Layer
Layer 3, the Network Layer

Question 24. 24. (TCO 6) What protocol is used to manage IP address space? 
ICMP
DHCP
TCP
SNMP

Question 25. 25. (TCO 6) Which type of access control would you use to grant permissions based on the sensitivity of the information contained in the objects?
Mandatory access control
Discretionary access control
Role-based access control
Rule-based access control

Write a password policy that your company will have to follow to ensure strong passwords.
Describe some of the types of attacks that can be launched against a network.
What is a DMZ, and what is it used for?
List three kinds of information contained in an IP packet header.
What laws protect the recording industry from digital piracy?
Describe the laws that govern digital signatures.
Explain some of the problems with PGP.
What are content- and context-based signatures? Which is best to use and why?
What are the four common methods for connecting equipment at the Physical Layer?
Evaluate the difference between a public CA and a private CA.
What is PII as it relates to privacy?
What are some Web-related privacy issues?
What is the importance of a baseline to change management?
What are the essential elements of change management?
What laws govern computer access and trespass? 

Reference no: EM13235804

Questions Cloud

Determine the ucl and lcl for the x-bar : Checkout time at a supermarket is monitored using a range and mean chart. Six samples which contain 20 observations per sample have been collected and the sample means and sample ranges have been computed as shown below.
Explain the net ionic equation to show the formation salt : Write the net ionic equation to show the formation of a precipitate (insoluble salt) when the following solutions are mixed. Write noreaction if no insoluble salt forms
How to make the down payment and the quarterly payments : An automobile is priced at $ 7,000. A buyer may purchase the car for $ 6,500 now, or alternatively, the buyer can make a down payment of $ 1,000 now and pay the remaining $ 6,000 in eight equal quarterly payments ( over 2 years)
What will make alternative2 equaly desirable to alternative1 : Your money is tied up and you need to borrow $ 10,000. The following two alternatives are being offered by the lender: ( 1) pay $ 3,288.91 at the end of each year for 5 years, starting at the end of the first year
What is a dmz and what is it used for : Write a password policy that your company will have to follow to ensure strong passwords.Describe some of the types of attacks that can be launched against a network.What is a DMZ, and what is it used for?
Analyze two of the four consequences of behavior : Analyze two of the four consequences of behavior, and illustrate an incidence where a combination of those two would occur together.
Find the number of theoretical stages : Perform a similar analysis of a stripping column. In this case, 100 lbmol/h of water with a concentration of 0.0045 lbmol SO2/ft3 is stripped with air to a concentration of 0.0005 lbmol SO2/ft3. The air flow rate is 1.5 times the minimum.
Find the level of newspaper and magazine advertising : Bounds Inc.has determined through regression analysis that its sales (S) are a function ofthe amount ofadvertising (measured in units) in two different media
Customers of an organization fall under : Customers of an organization fall under which of the following category?

Reviews

Write a Review

Accounting Basics Questions & Answers

  Problem on cost flow assumption

Nichols Company had 500 units of "Dink" in its inventory at a cost of $5 each. It purchased, for $2,400, 300 more units of "Dink". Nichols then sold 600 units at a selling price of $10 each, resulting in a gross profit of $2,100. The cost flow ass..

  Blue niles strategy for success in the marketplace

What is Blue Nile's strategy for success in the marketplace? Does the company rely primarily on a customer intimacy, operational excellence, or product leadership customer value proposition? What evidence from the 10-K supports your conclusion?

  Is it a current liability or a long term liability

Where on the balance sheet should a 20 year, 12% bond, due 1/1/2013 for $500,000 be listed. Is it a current liability or a long term liability?

  Question on private business competition

Choose an article on Private Business Competition from a professional, economic, or management journal published in the last ten years such as The Freeman: Ideas On Liberty, The Economist, Forbes, The Cato Journal, Harvard Business Review, or Sloa..

  Adjusting entry include a credit to allowance account

Chen Company's account balances at December 31, 2007 for Accounts Receivable and the Allowance for Doubtful Accounts are $320,000 debit and $600 credit. Sales during 2007 were $900,000. It is estimated that 1% of sales will be uncollectible. The a..

  Determining necessary sample size

Jolly Blue Giant Health Insurance (JBGHI) is concerned about rising lab test costs and would like to know what proportion of the positive lab tests for prostate cancer are actually proven correct through subsequent biopsy. JBGHI demands a sample l..

  Book value per share of common stock

At the end of 20B, Storage Company reported outstanding common stock (par $20) of $300,000. Total liabilities were $440,000 and total assets were $860,000. The company had no preferred stock. The book value per share of common stock was

  Compute the company residual income for the year

What is a balanced scorecard? How can it help you manage a company? Are there any advantages to using one?

  Future lease payments for an operating lease

Using IFRS, future lease payments for an operating lease include what required disclosures?

  Planned detection risk-inherent risk-control risk

What do following risk categories mean - planned detection risk, inherent risk, control risk, acceptable audit risk? Examples? How do we as auditors deal with them?

  Determine the adjustment to income due to the change

Determine the adjustment to income due to the change in accounting method and the amount that is allocated to 2005.

  Internal auditors for a federal agency

Assume that the client company, which handled some government contracts, had no internal auditors for a federal agency spent three weeks auditing the records and were just completing their work at this time.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd