1. Which of the following may be deployed in a network as lower cost surveillance and early-warning tools?
A) Honeypots
B) Hardware IPSs
C) Hardware IDSs
D) Botnets
E) Stateful inspection firewalls
F) Stateful logging facilities
2. Relatively speaking, firewalls operated at the application level of the seven layer OSI model are:
A) almost always less efficient.
B) almost always less effective.
C) almost always less secure.
D) almost always less costly to setup.
E) None of the choices.
3. Relatively speaking, firewalls operated at the physical level of the seven-layer OSI model are:
A) almost always less efficient.
B) almost always less effective.
C) almost always less secure.
D) almost always less costly to setup.
E) None of the choices.
4. Which of the following refers to the act of creating and using an invented scenario to persuade a target to perform an action?
A) Pretexting
B) Backgrounding
C) Check making
D) Bounce checking
E) None of the choices.
5. With Deep packet inspection, which of the following OSI layers are involved?
A) Layer 2 through Layer 7
B) Layer 3 through Layer 7
C) Layer 2 through Layer 6
D) Layer 3 through Layer 6
E) Layer 2 through Layer 5
F) None of the choices.