Mod 8 Security Technology: Access Controls, Firewalls, and VPNs PDF

Summary

This document appears to be a set of questions and answers about Security Technology, Access Controls, Firewalls, and VPNs.

Full Transcript

1. \_\_\_\_\_ inspection firewalls keep track of each network connection between internal and external systems. Ans: Stateful 2. A \_\_\_\_\_ filtering firewall can react to an emergent event and update or create rules to deal with the event. Ans: Dynamic 3. The dominant archi...

1. \_\_\_\_\_ inspection firewalls keep track of each network connection between internal and external systems. Ans: Stateful 2. A \_\_\_\_\_ filtering firewall can react to an emergent event and update or create rules to deal with the event. Ans: Dynamic 3. The dominant architecture used to secure network access today is the \_\_\_\_\_ firewall. Ans: Screened Subnet 4. What is the role of the Transformation Procedure (TP) in the Clark-Wilson Model? Ans: To ensure that data is transformed in a way that maintains integrity

Use Quizgecko on...
Browser
Browser