CYB 220 - WEEK 5 - 5-1 LAB QUESTIONS AND ANSWERS (GRADED A)
0 view 0 purchase
Course
CYB 220
Institution
CYB 220
CYB 220 - WEEK 5 - 5-1 LAB QUESTIONS AND ANSWERS (GRADED A)CYB 220 - WEEK 5 - 5-1 LAB QUESTIONS AND ANSWERS (GRADED A)CYB 220 - WEEK 5 - 5-1 LAB QUESTIONS AND ANSWERS (GRADED A)How does the ZoneAlarm Free Firewall open?
- When you open it
- When you input the command #ZoneAlarm
- After it is v...
To make the ZoneAlarm software more effective at fending off unwanted malware, you
must:
- Run it in Administration mode
- Update the signatures of the program
- Set the automatic updates to only user mode
- Install a second firewall - ANSWER-Update the signatures of the program
Why would someone use an anonymous proxy site?
- To uphold their workplace firewall policies
- To access non-work-related websites at work
- To make their firewall more resilient
- To display their IP address online - ANSWER-To access non-work-related websites at
work
Snort works in one of three modes:
, - Network intrusion detection, monitor, and operator relay
- Packet logger, monitor, and analyzer
- Sniffer, packet logger, and network intrusion detection
- Packet logger, notification agent, and data source recorder - ANSWER-Sniffer, packet
logger, and network intrusion detection
When implementing a firewall in an internal network, what element should be
considered a priority?
- The ability to properly bottleneck network traffic
- Amount of bandwidth needed for network traffic
- A connection to the internet
- Tiered tracing for troubleshooting problems - ANSWER-Amount of bandwidth needed
for network traffic
Logically separated subnets are still physically connected to:
- Other VLANS in the same subnet fabric
- Other VLANs in the same router fabric
- Other subnets in the same switch fabric
- Other subnets in the same VLAN fabric - ANSWER-Other subnets in the same switch
fabric
When configuring a host-based firewall, which elements should be considered?
- Inbound and outbound network traffic
- Inbound network traffic
- Inbound and outbound port traffic only
- Outbound network traffic - ANSWER-Inbound and outbound network traffic
There are several common components to an IDS. Which of the following are three of
them?
What is one reason that application firewalls should be closer to the resource being
protected?
- Because they are more commonly found in single-firewall architectures (Not this one)
- Because you are able to perform deep packet inspection
- Because it is more cost-effective
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller NursingTutor1. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.