Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
pl (1).docx
Скачиваний:
0
Добавлен:
01.05.2025
Размер:
2.83 Mб
Скачать

142. ______________ Firewall treats each network frame (Packet) in isolation.

Выберите один ответ.

Stateless

Network

Stateful

Software

Personal

143. How many keys are required for two people to communicate via a cipher?

Выберите один ответ.

One key for symmetric ciphers, two keys for asymmetric ciphers.

One key for symmetric ciphers, one key for asymmetric ciphers.

Two keys for symmetric ciphers, two keys for asymmetric ciphers.

None of the statements.

One key for asymmetric ciphers, two keys for symmetric ciphers.

144. ________________ - A software application which normally filters traffic entering or leaving a single computer.

Выберите один ответ.

Stateless Firewall

Software Firewall

Stateful Firewall

Personal Firewall

Network Firewall

144. A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.

Выберите один ответ.

Security service

Security mechanism

Security attack

All of the statements

Security threat

145. Which of the following are weaknesses of Packet Filtering Firewall? (Choose 3 answers)

Выберите по крайней мере один ответ:

Packet filtering is typically faster than other packet screening methods.

Packet filtering firewalls allow a direct connection to be made between the two endpoints.

Packet filtering firewalls are prone to certain types of attacks.

Packet filtering firewalls can be implementedtransparently.

Defining rules and filters on a packet filtering firewall can be a complex task.

146. Which of the following statements is not true?

Выберите один ответ.

A firewall cannot and does not guarantee that your network is 100% secure.

Firewalls can offer protection against inside attacks.

Firewalls cannot provide protection against viruses or malicious code.

Firewalls can be configured to require user authentication. This allows network administrators to control, track specific user activity.

No firewall can protect against inadequate or mismanaged policies.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]