Term
What severity code applies to any vulnerability that provides info that give unauthorized persons means to circumvent security controls |
|
Definition
|
|
Term
What severity code applies to any vulnerablity that provides information that could lead to comprise |
|
Definition
|
|
Term
What severity code applies to any vulnerablity that, when resolved, will prevent the possiblity of degraded security |
|
Definition
|
|
Term
The integrated network operations and security (INOSC) centers has several responsibilities except |
|
Definition
Install patches or perform any upgrades provided by AF enterprises |
|
|
Term
Active IDS block network traffic when it detects an intrusion, Active IDS are incorporated into |
|
Definition
|
|
Term
Which IDS examines traffic for suspicious patterns |
|
Definition
|
|
Term
Which IDS examines servers or client computers for patterns of intrusion |
|
Definition
|
|
Term
When using an IDS remember to |
|
Definition
use a centralized management console for system management |
|
|
Term
The disadvantage to of a host based IDS is that |
|
Definition
It consumes resources on the host it resides on and slows that device down |
|
|
Term
|
Definition
Cannot analyze encrypted packets because it has no method for decrypting data |
|
|
Term
Which IDS uses software sensors |
|
Definition
|
|
Term
Which IDS monitors packets for protocol anomalies and known virus signatures |
|
Definition
|
|
Term
Which port range constitutes well known ports |
|
Definition
|
|
Term
|
Definition
notes which ports responded to the scan |
|
|
Term
In which type of port scan does the scanner connect to the same port more than once |
|
Definition
|
|
Term
Above which layer of the open systems intergration OSI model are protocols designed to reside |
|
Definition
|
|
Term
Which organization has the responsibility of developing AF ports, protocols and services |
|
Definition
|
|
Term
Which organization has direct operational control of AF ports, protocols and services |
|
Definition
|
|
Term
What is the default read community string of a simple network management |
|
Definition
|
|
Term
To limit the risk associated with using simple network management protocol SNMP... |
|
Definition
Disable all SNMP devices if not required |
|
|
Term
Which tool is not used to test your SNMP security |
|
Definition
|
|
Term
Which open based NIDS performs packet logging and real-time traffic analysis |
|
Definition
|
|
Term
Which network based security tool is a hardware and software system listening for suspicious activity |
|
Definition
|
|
Term
Useful firewall shut down option if you need to connect directly to the firewall to access BIOS |
|
Definition
|
|
Term
Which security tool is designed ot manage sensitive data and enforce security policies across a full range of client platforms |
|
Definition
|
|
Term
Intergration of the capabilities of personnel, operations, and technology, best describe what concept |
|
Definition
|
|
Term
Restricting what traffic travels in and out of the network best describes |
|
Definition
|
|
Term
All can be implementd to help define internet protocol telephony systems except |
|
Definition
Consolidation of voice with your data using VLAN |
|
|
Term
The use of 2 or more NICS best describes which type of fire wall |
|
Definition
|
|
Term
Which type of firewall is typically used when speed is essential |
|
Definition
|
|
Term
Which type of firewall views information as a data stream and not as a series of packets |
|
Definition
|
|
Term
What was the previous name for what is now called the McAfee firewall enterprise |
|
Definition
|
|
Term
Most firewall implementations that you will encounter will be found at the |
|
Definition
|
|
Term
Which firewall management interface menu option views the association between MAC addresses on the firewall and its corresponding IP addresses |
|
Definition
Address resolution protocol ARP |
|
|
Term
What is the default firewall shutdown option |
|
Definition
Reboot to operational key |
|
|
Term
Which firewall shutdown option is useful to connect directly to access the BIOS |
|
Definition
|
|
Term
A firewall burb can best be defined as |
|
Definition
A set of one or more interfaces |
|
|
Term
Use the high availablity shared cluster addresses dialog box to do all the following except |
|
Definition
isolate cluster address from the DNS and default routes |
|
|
Term
What does a firewall support that improves system performance by lessening the load placed on the system kernel |
|
Definition
|
|
Term
Which BIND server type can there be as many servers as needed in a domain |
|
Definition
|
|
Term
Which BIND system provides reverse mapping |
|
Definition
|
|
Term
In BIND items stored in the DNS database best describes |
|
Definition
|
|
Term
Which BIND is responsible for zone transfers |
|
Definition
|
|
Term
Which flexible command line can be used to gather information form DNS |
|
Definition
|
|
Term
Which server is the only one that should have changes to DNS data |
|
Definition
|
|
Term
What term is used for DNS architecture when one or more name servers reside behind a firewall, and contain an inside hostname and IP address |
|
Definition
|
|
Term
Which ACL restricts packets into or out of a given layer 3 |
|
Definition
Router access control list RACL |
|
|
Term
Who approves or disapproves connections to the AF-GIG and accepts any risk created by the approved connections |
|
Definition
|
|
Term
Who reports all backdoors and unauthorized connections to AF network discovered during the course of operations |
|
Definition
AIR FORCE information warfare center (AFIWC/IO) |
|
|
Term
Which is not a category of software package available today used to detect and monitor network activity |
|
Definition
|
|
Term
While monitoring your network, a guideline you should remember is to |
|
Definition
oberserve regular network traffic and look for anomalies |
|
|
Term
Which mail system component sends or retrieves mail between the other agents using specific protocols |
|
Definition
|
|
Term
Which email server relays all email entering or exiting the local network |
|
Definition
|
|
Term
Which email servers delivers all outgoing email to the mail relay server |
|
Definition
|
|
Term
When using transparent mail services, the following mail filtering features are available except |
|
Definition
message attachment filtering |
|
|
Term
When using secure split mail services, all SMTP host will connect to the firewall's |
|
Definition
|
|
Term
Messages that are sent to the persons administering a mail system are generally addressed to |
|
Definition
|
|
Term
|
Definition
prevent organizations from obtaining visibility of users |
|
|
Term
When the cached information is verified to be up to date the proxy has ensured |
|
Definition
|
|
Term
Which proxy is located near the web server and acts as an intermediary between a web server and internet |
|
Definition
|
|
Term
What type of proxy must be run because of an attackers potential to exploit an operationg system |
|
Definition
|
|
Term
The vulnerabilities of voice and data converged networks were highlighted in a report released by the |
|
Definition
Presidents national security telecommunications advisory committee |
|
|
Term
Who owns the enterprise telephony management systems |
|
Definition
|
|
Term
During the initial research for voice system security, who recognized that the most common security threats could be addressed by the VPS |
|
Definition
Air Force information warfare battlelab |
|
|
Term
All of the following are characteristics and capabilities of a Voice protection system (VPS) except |
|
Definition
Centralizing yet distributing management |
|
|
Term
Which VPS application provides allows you to view realtime monitoring and policy processing, view systems diagnostics and use VPS rule based policy |
|
Definition
|
|
Term
Which VPS application generates reports of VPS system activity, policy processing, and resource utilization |
|
Definition
|
|
Term
All of the following are VPS policy types except |
|
Definition
|
|
Term
VPS reports provides a full service reporting package that enable you to do all the following except |
|
Definition
provide conversation transcript |
|
|