98 Chapter 4 ■ Communication and Network Security (Domain 4)
- What type of firewall design does the following image show?
Firewall
DMZ
Private Network
Router
Internet
A. A single-tier firewall
B. A two-tier firewall
C. A three-tier firewall
D. A fully protected DMZ firewall
- What challenge is most common for endpoint security system deployments?
A. Compromises
B. The volume of data
C. Monitoring encrypted traffic on the network
D. Handling non-TCP protocols - What type of address is 127.0.0.1?
A. A public IP address
B. An RFC 1918 address
C. An APIPA address
D. A loopback address - Susan is writing a best practices statement for her organizational users who need to use
Bluetooth. She knows that there are many potential security issues with Bluetooth and
wants to provide the best advice she can. Which of the following sets of guidance should
Susan include?
A. Use Bluetooth’s built-in strong encryption, change the default PIN on your device,
turn off discovery mode, and turn off Bluetooth when it’s not in active use.
B. Use Bluetooth only for those activities that are not confidential, change the default
PIN on your device, turn off discovery mode, and turn off Bluetooth when it’s not in
active use.
C. Use Bluetooth’s built-in strong encryption, use extended (8 digit or longer) Bluetooth
PINs, turn off discovery mode, and turn off Bluetooth when it’s not in active use.
D. Use Bluetooth only for those activities that are not confidential, use extended (8 digit
or longer) Bluetooth PINs, turn off discovery mode, and turn off Bluetooth when it’s
not in active use.