|Question 1||10 / 10 points|
You are the system administrator for a secure Web site that hosts sensitive information. Which port do you need to permit access through the firewall?
|Question 2||10 / 10 points|
A vulnerability assessment is most effective in representing how an attacker would attempt to gain access to an organization’s systems.
|Question 3||10 / 10 points|
Which network segment is considered the most secure?
|b. demilitarized zone (DMZ)|
|d. semi-protected network|
|Question 4||10 / 10 points|
Firewalls use __________ to identify acceptable communication ports.
|Question 5||10 / 10 points|
A man-in-the-middle (MITM) attack may attempt to inject malicious information into the communication stream.
|Question 6||10 / 10 points|
A(n) __________ is used to connect separate networks to each other.
|Question 7||10 / 10 points|
A(n) __________ is a set of rules governing the exchange of data between two entities.
|Question 8||10 / 10 points|
If you were connecting a mail server to your network, you would need to ensure that this protocol was permitted on the firewall.
|Question 9||10 / 10 points|
A(n) __________ looks for suspicious traffic; a(n) __________ blocks suspicious traffic.
|a. firewall, IDS|
|b. IDS, IPS|
|c. IPS, IDS|
|d. IDS, router|
|Question 10||10 / 10 points|
A Web server would reside on the __________.