IT 357 Final Exam with COMPLETE SOLUTION | 108 Questions with 100% Correct Answers
A common firewall deployment design creates three zones of trust - an untrusted public Internet, a trusted private LAN and a partially trusted DMZ. Which type of firewall is appropriate for this design? A. A dual-homed firewall B. An application firewall C. A tripled-homed firewall D. A host firewall Correct Answer: C: A Tripled-homed firewall Services such as website blacklisting, malformed URL, content filtering etc. can be carried out by a A. Hardware firewall B. Application proxy firewall C. Screening router D. HTTP server Correct Answer: B. Application proxy firewall The difference between a virus and a worm is that A. a virus requires user interaction to spread while a worm is autonomous B. a virus can be detected by an anti-virus software while a worm cannot be detected C. a virus targets a host while a worm targets a network D. a virus can be hidden as a Trojan horse while a worm cannot be hidden that way Correct Answer: A. a virus requires user interaction to spread while a worm is autonomous An anti-virus software cannot detect A. a Trojan horse B. Adware C. a virus D. a hardware keystroke logger Correct Answer: D. a hardware keystroke logger Which of the following can prevent eavesdropping attacks on a network? A. Encryption B. Reverse proxies C. network monitoring for rogue access points D. Firewalls Correct Answer: A. Encryption Hackers can be deterred by defense methods that detect and evade. All the following are defense methods, except which one? A. Firewalls B. IDSs C. VPNs D. Botnet army Correct Answer: D. Botnet army
Written for
- Institution
-
Western Governors University
- Course
-
IT 357
Document information
- Uploaded on
- November 29, 2022
- Number of pages
- 16
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
it 357 final exam with complete solution | 108 questions with 100 correct answers
Also available in package deal