What are the three basic areas of a newly installed ISA Server 2006 firewall?
You have just installed ISA Server 2006 on a Windows Server in your network, and you are
familiarizing yourself with the new firewall. What are the three basic areas of a newly installed ISA
Server 2006 firewall?
which two layers of the OSI model does a simple (stateless) packet filtering firewall operate?
You are considering your options for a new firewall deployment. At which two layers of the OSI
model does a simple (stateless) packet filtering firewall operate?
What kinds of attacks will this system be able to detect?
You have just installed your new network-based IDS. What kinds of attacks will this system be
able to detect?
what is the process by which you remove un-needed services and features from a machine to reduce the risk of v
When installing a firewall, what is the process by which you remove un-needed services and
features from a machine to reduce the risk of vulnerabilities to the underlying OS called?
What is the part of ISA Server used for saving your configuration changes?
Recently, you have made many changes to your ISA Server 2006 firewall. You are concerned
about saving these changes. What is the part of ISA Server used for saving your configuration
changes?
Which of the following best describes Access rules and Publishing rules?
You are building the rules for your newly installed ISA Server 2006. There are three basic rule
types:
Access rules, Publishing rules, and Network rules. Which of the following best describes Access
rules and Publishing rules?
Which of the following lists has the proper order for how ISA Server 2006 checks rule elements that make up an
ISA Server 2006 features extensive rule matching abilities. Which of the following lists has the
proper order for how ISA Server 2006 checks rule elements that make up an Access rule?
What must you do to get these new rules to take function?
You have made some changes to the configuration of your ISA Server 2006 firewall. While
analyzing the network traffic, you see that these changes have not yet taken affect. What must you
do to get these new rules to take function?
What is the order of the defensive layers a cracker would have to compromise when attacking a properly secured
What is the order of the defensive layers a cracker would have to compromise when attacking a
properly secured network?
A) Firewall
B) Router
C) Application
D) Host
E) IDS
Which of the following defines an event where an alarm is indicating an intrusion when there is no actual intr
You are configuring your new Intrusion Detection System, and studying the true-false matrix. You
read about the different types of alarms and events. Which of the following defines an event where
an alarm is indicating an intrusion when there is no actual intrusion?