Mod 8 Security Technology: Access Controls, Firewalls, and VPNs PDF
Document Details
Uploaded by HarmoniousPlateau8094
Tags
Summary
This document appears to be a set of questions and answers about Security Technology, Access Controls, Firewalls, and VPNs.
Full Transcript
1. \_\_\_\_\_ inspection firewalls keep track of each network connection between internal and external systems. Ans: Stateful 2. A \_\_\_\_\_ filtering firewall can react to an emergent event and update or create rules to deal with the event. Ans: Dynamic 3. The dominant archi...
1. \_\_\_\_\_ inspection firewalls keep track of each network connection between internal and external systems. Ans: Stateful 2. A \_\_\_\_\_ filtering firewall can react to an emergent event and update or create rules to deal with the event. Ans: Dynamic 3. The dominant architecture used to secure network access today is the \_\_\_\_\_ firewall. Ans: Screened Subnet 4. What is the role of the Transformation Procedure (TP) in the Clark-Wilson Model? Ans: To ensure that data is transformed in a way that maintains integrity