Nt1330 Unit 7 Essay

Words: 963
Pages: 4

Marvin Austrie
Unit 7Assignment
Kaplan University
IT279 Certified Information Systems Security Professional 2
Professor Laurent Boucard
6/04/18

1) You are aware that any system on the demilitarized zone (DMZ) can be compromised because the DMZ is accessible from the Internet. What should you do because of this?
a) Implement both DMZ firewalls as bastion hosts.
b) Implement every computer on the DMZ as bastion hosts.
c) Implement the DMZ firewall that connects to the Internet as a bastion host.
Answer: B
A bastion host or screened host is just a firewall system logically positioned between a private network and an untrusted network. - Ed Tittle CISSP Study Guide (sybex) pg 93
2) What is a disadvantage of a hardware firewall
…show more content…
7) Which protocol uses encryption to protect transmitted traffic and supports the transmission of multiple protocols?
a) HTTP
b) L2TP over IPSec
c) HTTPS
Answer: C
The Layer 2 Tunnel Protocol (L2TP) is an emerging Internet Engineering Task Force (IETF) standard that combines the best features of two existing tunneling protocols. IPSec is a series of guidelines for the protection of Internet Protocol (IP) communications. It specifies ways for securing private information transmitted over public networks. Services supported by IPSec include confidentiality (encryption), authenticity (proof of sender), integrity (detection of data tampering) and replay protection (defense against unauthorized re-sending of data) ("Extra 1257-1356 Flashcards by Susan Bowers | Brainscape", 2018).

8) An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network. Which protocol should be used?
a) PAP
b) LDAP
c)
…show more content…
- Definition from WhatIs.com. (2018). Retrieved from https://searchmobilecomputing.techtarget.com/definition/LDAP Services, P., Switches, D., Switches, C., & Papers, W. (2018). Cut-Through and Store-and-Forward Ethernet Switching for Low-Latency Environments. Retrieved from https://www.cisco.com/c/en/us/products/collateral/switches/nexus-5020-switch/white_paper_c11-465436.html SY0-401:1 TS Quiz Network Security Flashcards | Quizlet. (2018). Retrieved from https://quizlet.com/93941745/sy0-4011-ts-quiz-n
Gordon, A. (2015). Official (ISC) 2 Guide to the CISSP CBK. (4th, Ed.). [VitalSource Bookshelf Online]. Retrieved from https://kaplan.vitalsource.com/#/books/9781482262766/
Miller, L. C., Gregory, P. H. (2016). CISSP for dummies. (4th, Ed.). [VitalSource Bookshelf Online]. Retrieved from https://kaplan.vitalsource.com/#/books/9781119210252/
Stewart, J., Chapple, M., & Gibson, D. (2015). CISSP: Certified information systems security profesioinal study guide. (7th, Ed.). [VitalSource Bookshelf Online]. Retrieved from https://kaplan. vitalsource.com/#/books/9781119042754/cfi/6/2
Extra 1257-1356 Flashcards by Susan Bowers | Brainscape. (2018). Retrieved from