Instructor's note: Answers explained

Intrusion Defense School

Take the entrance exam


Return to Intrusion Defense School
1.) The 12 different technologies that are showing up in UTM devices are:
  • Antispam
  • Antivirus
  • Antispyware
  • Antiphishing
  • Intrusion prevention
  • DoS/DDoS mitigation
  • Content filtering
  • Application blocking
  • Bandwidth management
  • Regulatory logging/blocking
Learn about the components of UTM in the Lesson 3 webcast, Understanding UTM.

2.) The benefits of combined boxes are:

  • Manageability
  • Compatibility
  • Completeness
  • Affordability
Learn more about these arguments in favor of combined boxes in the Lesson 1 webcast, Perimeter defense: How to keep the perimeter secure.

3.) Some rules-of-thumb for slowdown are:

  • UTM devices require firewall performance boosts.
  • UTM features have substantial performance penalties.
  • The more features you turn on, the greater the penalty.
  • UTM vendors tend not to share performance data.
Learn more about the impact of UTM devices on the network in the Lesson 3 webcast, Understanding Unified Threat Management.

4.) The five critical features in an edge e-mail security device are:

  • Reputation-based IP filtering
  • Powerful signature/heuristic-based anti-spam
  • End-user based quarantine
  • Per-user settings
  • Greater control, reporting
Learn more about edge e-mail security devices and their role in an antispam strategy in the Lesson 3 webcast, Understanding Unified Threat Management.

5.) ALE -- Annual Loss Expectancy
SLE -- Single Loss Expectancy
EF -- Exposure Factor
ARO -- Annual Rate of Occurrence

Learn how to apply ALE, SLE, EF and ARO in a traditional framework to justify security investment in the Lesson 4 webcast, Making the business for intrusion defense.

Take the entrance exam

Return to Intrusion Defense School

This was first published in April 2006

Dig deeper on UTM Appliances and Strategies

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close