Three widely used authentication methods, or "factors" are Correct Ans-"something a
supplicant knows
something a supplicant has
something a supplicant is"
A policy of assigning local non-routable IP addresses (from a reserved subnet) to each
corporate internet device, and then employing network address translation to provide
routable IP addresses to specific devices on an as-needed basis is called Correct Ans-
dynamic IP addresses
A packet-filtering firewall is an intelligent packet selecting hub, router or switch which can
selectively allow or deny ___ on an individual basis Correct Ans-packets
____ packet filtering firewalls detect patterns in current network traffic and automatically
update firewall rules tables Correct Ans-dynamic
The process of selecting a proper firewall for the needs of a given organization can become
quite complex, and may benefit from the ___ process in order to assess the expected
monetary impact of various options. Correct Ans-cost / benefit analysis
Though in casual use we refer to a fully-specified IP address as a host address, in reality it
identifies a specific _______ _______ _______ (3 words). Correct Ans-network interface
controller
, CSE 4471 Final Study Guide Questions and Answers
A _______ _______ (2 words) is simply an identifier that a software application or service has
"bound" to in order to indicate to the operating system that packets containing that identifer
should be delivered to the binding application or service. Correct Ans-port number
_______ _________ (2 words) is the selective method by which systems specify who may use
a particular resource and how they may use it. Correct Ans-Access control
A(n) _______ _______ _______ (3 words) is a specification of an organization's information
asset, the users who may access and use it, and their rights and privileges for using the asset.
Correct Ans-access control list
Interestingly, the degree of acceptance (by users) of biometric authentication methods is
often directly opposite their degree of _______. Correct Ans-effectiveness
IDPS Best suited to defend against a footprinting attack Correct Ans-NIDPS
IDPS best suited to defend against an SQL injecttion attack Correct Ans-AIDPS
IDPS type best suited to defend against a USB-delivered trojan horse attack Correct Ans-
HIDPS