🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Network Security Best Practices Quiz
22 Questions
2 Views

Network Security Best Practices Quiz

Created by
@ComfortingWetland

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What happens to packets classified as a member of a 'blocked stream'?

  • They are marked for further inspection
  • They are manually cleared from the connection table
  • They are discarded (correct)
  • They are allowed into the connection table
  • What determines the time interval before a blocked connection is cleared from the connection table?

  • Global timeout interval for TCP traffic (correct)
  • Number of blocked packets
  • Type of attack
  • Connection speed
  • When are incoming packets for a blocked stream blocked at the IPS device?

  • When the stream exceeds a certain packet count
  • Only during peak hours
  • Before the global timeout interval elapses (correct)
  • After the connection is cleared
  • What action is taken if a packet matches a filter with an action set of BLOCK?

    <p>The packet is discarded</p> Signup and view all the answers

    How can blocked streams be cleared from the connection table?

    <p>Manually from the Blocked Streams page</p> Signup and view all the answers

    What happens to incoming connections after the connection timeout interval expires?

    <p>They are only allowed if they match another blocking filter</p> Signup and view all the answers

    What does TSE stand for in the context of this lesson?

    <p>Threat Suppression Engine</p> Signup and view all the answers

    What does TPS stand for in the context of this lesson?

    <p>Traffic Processing System</p> Signup and view all the answers

    What does IPS stand for?

    <p>Intrusion Prevention System</p> Signup and view all the answers

    What is the minimum length requirement for user names at the 'None' authentication level?

    <p>At least six characters</p> Signup and view all the answers

    What is the additional requirement for user names at the 'Low' authentication level?

    <p>Must contain at least two alphabetic characters</p> Signup and view all the answers

    What is the password length requirement at the 'Medium' authentication level?

    <p>At least 15 characters</p> Signup and view all the answers

    What is the primary requirement for passwords at the 'High' authentication level?

    <p>At least one numeric character</p> Signup and view all the answers

    What is necessary to place the device in L2FB from the Command Line Interface (CLI)?

    <p>Taking the TPS out of SMS control</p> Signup and view all the answers

    What is the Best Practice regarding snapshots for the TPS device?

    <p>Creating snapshots each time the TPS device is modified</p> Signup and view all the answers

    Where are snapshots stored?

    <p>On the external storage device</p> Signup and view all the answers

    How can you manage the snapshots taken of device filters and settings?

    <p>Via the SMS System Snapshot section</p> Signup and view all the answers

    What happens if you perform a TOS upgrade on the TPS?

    <p>The snapshots taken on a previous version of the TOS will not be visible after the upgrade</p> Signup and view all the answers

    What is required to lose connectivity to the device?

    <p>Losing power to the device</p> Signup and view all the answers

    What does archiving a snapshot do?

    <p>Stores a copy on the SMS</p> Signup and view all the answers

    When should you perform a snapshot for the TPS device?

    <p>Each time the TPS device is modified</p> Signup and view all the answers

    What option do you have for including LSM created Reputation Entries in snapshots?

    <p>Include LSM created Reputation Entries in all snapshots, regardless of storage location</p> Signup and view all the answers

    More Quizzes Like This

    Mastering Network Security
    5 questions

    Mastering Network Security

    UnselfishAffection avatar
    UnselfishAffection
    Trend Micro Network Security Quiz
    27 questions
    Cyber Security Overview
    12 questions

    Cyber Security Overview

    TransparentGermanium avatar
    TransparentGermanium
    Use Quizgecko on...
    Browser
    Browser