you (5 pts each) a) Which of the following are the most important functions of a NAC in setting up a compliance program? Explain. A) Policies, authentication and access control

you (5 pts each) a)  Which of the following are the most important functions of a NAC in setting up a compliance program? Explain. A) Policies, authentication and access control B) Authentication, access control and remediation C) Authentication, access control and audit D) Policies, remediation and audit c)  role does the policy server play in endpoint security? Explain. A) It retrieves security credentials directly from the endpoints. B) It evaluates security credentials and makes an admission control policy decision. C) It enforces admission control policy decision. D) All of the above d)  A deviation from an organization-wide security policy requires which of the following? Explain. A) Risk Assignment B) Risk Containment (5 pts each) a) Which two answers are the primary header formats for IPsec? A) Transport and Session Header B) Encapsulating and Authenticating Header C) Authentication Header and Encapsulating Security Payload D) TCP and UDP b) In tunneling, an IP datagram is _______. A) First encapsulated in another datagram and then encrypted. B) First encrypted and then encapsulated in another datagram. C) First authenticated and then encrypted. D) First encrypted and then authenticated. c) is the relationship between a VPN and an extranet? Explain. A) Some extranets are VPNs; some VPNs are extranets. B) Some extranets are VPNs; all VPNs are extranets. C) VPNs and extranets are the same type of network. D) VPNs are unrelated to extranets. d) Which one is the best approach to VPNs? Explain. A) VPN-specific gateway device. B) Router-based. C) Firewall-based. D) Software only. E) All of the above. (5 pts each) a) Which is untrue of a packet filtering firewall? Explain. A) gh security. B) Application independence. C) Performance strength. D) Excellent scalability. b) Firewalls can be implemented in different ways. Consider a dedicated firewall device. is its major advantage when the target is throughput and security? Explain. A) The management console is easily installed. B) The device contains proprietary operating systems. C) The connection to the device is monitored by security personnel. D) A thorough packet inspection capability. E) The hackers know most router-based firewall code. c) Of the following choices, which one is a type of firewall actively maintaining awareness of the status conversations between internal and external hosts? Explain. A) Stateful Firewall. B) Non-Passive Firewall. C) Active State Firewall. D) Stateless Firewall. E) None of the above d) Which answer BEST describes a device that sits between your users and the internet and rewrites source ports and source IP Addresses and enhances your security posture? Explain. A) Network Address Translator. B) Web Proxy. C) Web Firewall. D) Host based firewall. (5 pts each) a) is the protocol developed for the wireless network communications? Explain. A) Wireless Encryption Protocol (WEP) B) Wireless Application Protocol (WAP) C) Wired Equivalent Privacy (WEP) D) Wireless Session Protocol (WSP) b) c) d) Which of the following is not a reason why WEP may be considered vulnerable? Explain. (Select all that apply.) A) Shared WEP keys among all clients B) 20-bit initialization vector C) An RC4 engine not properly initialized D) 48-bit WEP keys a) kind of Encryption technology does SSL utilize? A) Secret or Symmetric key B) Hybrid (both Symmetric and Asymmetric) C) Public Key D) Private key b) The role of SSL is to _________ A) Encrypt specific elements of data for application-specific purposes. B) Encrypt files located on a Web server. C) Encrypt data as it travels over a network. D) Encrypt digital certificates used to authenticate a Web site. E) Encrypt passwords for storage in a database. c) Which two of the following technologies protect web communications and promote a secure online environment?  Explain. A) SSH and SFTP. B) HTTP and PKI. C) SSL and TLS. D) SSL and Telnet. d) Which of the following is the most common attack on DNS servers? Explain. A) Poisoning B) Flood C) Ping D) Masquerading Purchase the answer to view it

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer