Instructor's note: Answers explained

Intrusion Defense School

Take the entrance exam

Return to Intrusion Defense School
1.) The 12 different technologies that are showing up in UTM devices are:
  • Antispam
  • Antivirus
  • Antispyware
  • Antiphishing
  • Intrusion prevention
  • DoS/DDoS mitigation
  • Content filtering
  • Application blocking
  • Bandwidth management
  • Regulatory logging/blocking
Learn about the components of UTM in the Lesson 3 webcast, Understanding UTM.

2.) The benefits of combined boxes are:

  • Manageability
  • Compatibility
  • Completeness
  • Affordability
Learn more about these arguments in favor of combined boxes in the Lesson 1 webcast, Perimeter defense: How to keep the perimeter secure.

3.) Some rules-of-thumb for slowdown are:

  • UTM devices require firewall performance boosts.
  • UTM features have substantial performance penalties.
  • The more features you turn on, the greater the penalty.
  • UTM vendors tend not to share performance data.
Learn more about the impact of UTM devices on the network in the Lesson 3 webcast, Understanding Unified Threat Management.

4.) The five critical features in an edge e-mail security device are:

  • Reputation-based IP filtering
  • Powerful signature/heuristic-based anti-spam
  • End-user based quarantine
  • Per-user settings
  • Greater control, reporting
Learn more about edge e-mail security devices and their role in an antispam strategy in the Lesson 3 webcast, Understanding Unified Threat Management.

5.) ALE -- Annual Loss Expectancy
SLE -- Single Loss Expectancy
EF -- Exposure Factor
ARO -- Annual Rate of Occurrence

Learn how to apply ALE, SLE, EF and ARO in a traditional framework to justify security investment in the Lesson 4 webcast, Making the business for intrusion defense.

Take the entrance exam

Return to Intrusion Defense School

This was last published in April 2006

Dig Deeper on Network device security: Appliances, firewalls and switches

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.