Term
| What severity code applies to any vulnerability that provides info that give unauthorized persons means to circumvent security controls |
|
Definition
|
|
Term
| What severity code applies to any vulnerablity that provides information that could lead to comprise |
|
Definition
|
|
Term
| What severity code applies to any vulnerablity that, when resolved, will prevent the possiblity of degraded security |
|
Definition
|
|
Term
| The integrated network operations and security (INOSC) centers has several responsibilities except |
|
Definition
| Install patches or perform any upgrades provided by AF enterprises |
|
|
Term
| Active IDS block network traffic when it detects an intrusion, Active IDS are incorporated into |
|
Definition
|
|
Term
| Which IDS examines traffic for suspicious patterns |
|
Definition
|
|
Term
| Which IDS examines servers or client computers for patterns of intrusion |
|
Definition
|
|
Term
| When using an IDS remember to |
|
Definition
| use a centralized management console for system management |
|
|
Term
| The disadvantage to of a host based IDS is that |
|
Definition
| It consumes resources on the host it resides on and slows that device down |
|
|
Term
|
Definition
| Cannot analyze encrypted packets because it has no method for decrypting data |
|
|
Term
| Which IDS uses software sensors |
|
Definition
|
|
Term
| Which IDS monitors packets for protocol anomalies and known virus signatures |
|
Definition
|
|
Term
| Which port range constitutes well known ports |
|
Definition
|
|
Term
|
Definition
| notes which ports responded to the scan |
|
|
Term
| In which type of port scan does the scanner connect to the same port more than once |
|
Definition
|
|
Term
| Above which layer of the open systems intergration OSI model are protocols designed to reside |
|
Definition
|
|
Term
| Which organization has the responsibility of developing AF ports, protocols and services |
|
Definition
|
|
Term
| Which organization has direct operational control of AF ports, protocols and services |
|
Definition
|
|
Term
| What is the default read community string of a simple network management |
|
Definition
|
|
Term
| To limit the risk associated with using simple network management protocol SNMP... |
|
Definition
| Disable all SNMP devices if not required |
|
|
Term
| Which tool is not used to test your SNMP security |
|
Definition
|
|
Term
| Which open based NIDS performs packet logging and real-time traffic analysis |
|
Definition
|
|
Term
| Which network based security tool is a hardware and software system listening for suspicious activity |
|
Definition
|
|
Term
| Useful firewall shut down option if you need to connect directly to the firewall to access BIOS |
|
Definition
|
|
Term
| Which security tool is designed ot manage sensitive data and enforce security policies across a full range of client platforms |
|
Definition
|
|
Term
| Intergration of the capabilities of personnel, operations, and technology, best describe what concept |
|
Definition
|
|
Term
| Restricting what traffic travels in and out of the network best describes |
|
Definition
|
|
Term
| All can be implementd to help define internet protocol telephony systems except |
|
Definition
| Consolidation of voice with your data using VLAN |
|
|
Term
| The use of 2 or more NICS best describes which type of fire wall |
|
Definition
|
|
Term
| Which type of firewall is typically used when speed is essential |
|
Definition
|
|
Term
| Which type of firewall views information as a data stream and not as a series of packets |
|
Definition
|
|
Term
| What was the previous name for what is now called the McAfee firewall enterprise |
|
Definition
|
|
Term
| Most firewall implementations that you will encounter will be found at the |
|
Definition
|
|
Term
| Which firewall management interface menu option views the association between MAC addresses on the firewall and its corresponding IP addresses |
|
Definition
| Address resolution protocol ARP |
|
|
Term
| What is the default firewall shutdown option |
|
Definition
| Reboot to operational key |
|
|
Term
| Which firewall shutdown option is useful to connect directly to access the BIOS |
|
Definition
|
|
Term
| A firewall burb can best be defined as |
|
Definition
| A set of one or more interfaces |
|
|
Term
| Use the high availablity shared cluster addresses dialog box to do all the following except |
|
Definition
| isolate cluster address from the DNS and default routes |
|
|
Term
| What does a firewall support that improves system performance by lessening the load placed on the system kernel |
|
Definition
|
|
Term
| Which BIND server type can there be as many servers as needed in a domain |
|
Definition
|
|
Term
| Which BIND system provides reverse mapping |
|
Definition
|
|
Term
| In BIND items stored in the DNS database best describes |
|
Definition
|
|
Term
| Which BIND is responsible for zone transfers |
|
Definition
|
|
Term
| Which flexible command line can be used to gather information form DNS |
|
Definition
|
|
Term
| Which server is the only one that should have changes to DNS data |
|
Definition
|
|
Term
| What term is used for DNS architecture when one or more name servers reside behind a firewall, and contain an inside hostname and IP address |
|
Definition
|
|
Term
| Which ACL restricts packets into or out of a given layer 3 |
|
Definition
| Router access control list RACL |
|
|
Term
| Who approves or disapproves connections to the AF-GIG and accepts any risk created by the approved connections |
|
Definition
|
|
Term
| Who reports all backdoors and unauthorized connections to AF network discovered during the course of operations |
|
Definition
| AIR FORCE information warfare center (AFIWC/IO) |
|
|
Term
| Which is not a category of software package available today used to detect and monitor network activity |
|
Definition
|
|
Term
| While monitoring your network, a guideline you should remember is to |
|
Definition
| oberserve regular network traffic and look for anomalies |
|
|
Term
| Which mail system component sends or retrieves mail between the other agents using specific protocols |
|
Definition
|
|
Term
| Which email server relays all email entering or exiting the local network |
|
Definition
|
|
Term
| Which email servers delivers all outgoing email to the mail relay server |
|
Definition
|
|
Term
| When using transparent mail services, the following mail filtering features are available except |
|
Definition
| message attachment filtering |
|
|
Term
| When using secure split mail services, all SMTP host will connect to the firewall's |
|
Definition
|
|
Term
| Messages that are sent to the persons administering a mail system are generally addressed to |
|
Definition
|
|
Term
|
Definition
| prevent organizations from obtaining visibility of users |
|
|
Term
| When the cached information is verified to be up to date the proxy has ensured |
|
Definition
|
|
Term
| Which proxy is located near the web server and acts as an intermediary between a web server and internet |
|
Definition
|
|
Term
| What type of proxy must be run because of an attackers potential to exploit an operationg system |
|
Definition
|
|
Term
| The vulnerabilities of voice and data converged networks were highlighted in a report released by the |
|
Definition
| Presidents national security telecommunications advisory committee |
|
|
Term
| Who owns the enterprise telephony management systems |
|
Definition
|
|
Term
| During the initial research for voice system security, who recognized that the most common security threats could be addressed by the VPS |
|
Definition
| Air Force information warfare battlelab |
|
|
Term
| All of the following are characteristics and capabilities of a Voice protection system (VPS) except |
|
Definition
| Centralizing yet distributing management |
|
|
Term
| Which VPS application provides allows you to view realtime monitoring and policy processing, view systems diagnostics and use VPS rule based policy |
|
Definition
|
|
Term
| Which VPS application generates reports of VPS system activity, policy processing, and resource utilization |
|
Definition
|
|
Term
| All of the following are VPS policy types except |
|
Definition
|
|
Term
| VPS reports provides a full service reporting package that enable you to do all the following except |
|
Definition
| provide conversation transcript |
|
|