A single enclave may span a number of geographically separate locations with connectivity via commercially purchased point-to-point communications (e.g., T-1, T-3, and ISDN) along with WAN connectivity such as the Internet. An enclave is a collection of information systems connected by one or more internal networks under the control of a single organization and security policy. These systems may be structured by physical proximity or by function, independent of location. An enclave boundary is a point at which an enclave’s internal network service layer connects to an external network’s service layer (i.e., to another enclave or to a wide-area network).
151. Which of the following virtual private network (VPN) architectures often replaces costly private wide-area network (WAN) circuits?
a.
Gateway-to-gatewayb.
Host-to-gatewayc.
Contractor-to-companyd.
Host-to-hostThe host-to-gateway VPN architecture often replaces dial-up modem pools, is somewhat complex to implement and maintain for user and host management, and is most often used to provide secure remote access.
The contractor-to-company architecture is an exclusive connection between the VPN client and the VPN network device; all other connectivity is blocked after the establishment of the VPN session, so there is no chance of IP packets being forwarded between the Internet and the company’s private network.
The host-to-host VPN architecture is most often used when a small number of trusted users need to use or administer a remote system that requires the use of insecure protocols (e.g., a legacy system), that requires a secure remote access solution, and that can be updated to provide VPN services. System administrators performing remote management of a single server can use the host-to-host VPN architecture. The host-to-host VPN architecture is resource-intensive to implement and maintain for user and host management.
152. Which of the following provides stronger security in administering the network devices, such as routers or switches?
a.
Simple network management protocol (SNMP)b.
SNMP version 1c.
SNMP version 2d.
SNMP version 3153. Which of the following models is used for formally specifying and verifying protocols?
a.
Protocol converterb.
Protocol tunnelingc.
Petri net modeld.
Seeding modelThe other three choices do not deal with formally specifying and verifying protocols. A protocol converter is a device that changes one type of coded data to another type of coded data for computer processing. Protocol tunneling is a method to ensure confidentiality and integrity of data transmitted over the Internet. A seeding model is used to indicate software reliability in terms of error detection power of a set of test cases.
154. The penetration testing of security controls does
a.
Technical controlsb.
Physical controlsc.
Management controlsd.
Procedural controls