Exam 3: Fundamentals of Firewalls
Exam 1: Introduction to Network Security25 Questions
Exam 2: Types of Attacks27 Questions
Exam 3: Fundamentals of Firewalls27 Questions
Exam 4: Firewall Practical Applications19 Questions
Exam 5: Intrusion-Detection Systems26 Questions
Exam 6: Encryption25 Questions
Exam 7: Virtual Private Networks26 Questions
Exam 8: Operating System Hardening28 Questions
Exam 9: Defending Against Virus Attacks28 Questions
Exam 10: Defending Against Trojan Horses,spyware,and Adware26 Questions
Exam 11: Security Policies21 Questions
Exam 12: Assessing a System30 Questions
Exam 13: Security Standards21 Questions
Exam 14: Choosing Defense Strategies24 Questions
Select questions type
A firewall that uses a combination of approaches rather than a single approach to protect the network is called:
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
B
Once a circuit level gateway verifies the user's logon,it creates a virtual circuit between:
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
B
A ____________ firewall solution is actually a combination of several different firewall systems in a single system.
Free
(Short Answer)
4.8/5
(42)
Correct Answer:
hybrid
Identifying abnormal activity on a firewall requires that one establish a:
(Multiple Choice)
4.8/5
(31)
Which type of firewall is included in Windows XP and many distributions of Linux operating systems?
(Multiple Choice)
4.8/5
(37)
In many typical configurations with multiple firewalls,e-mail servers and FTP servers are located in the:
(Multiple Choice)
4.8/5
(31)
A term used to refer to the process of authentication and verification as accomplished on some gateways is ____________.
(Short Answer)
4.8/5
(34)
Taking security precautions such as keeping patches updated,uninstalling unneeded applications,closing unused ports,and turning off unused services is called ____________ the operating system.
(Short Answer)
4.7/5
(32)
Which type of firewall negotiates between the server and client to permit or deny connection based on the type of software and connection requested?
(Multiple Choice)
4.8/5
(41)
Which serves as a single contact point between the Internet and the private network?
(Multiple Choice)
4.9/5
(42)
With a circuit level gateway in place,external users only see the IP address of the ____________.
(Short Answer)
5.0/5
(39)
How can vulnerability to flooding attacks be reduced with an application gateway?
(Multiple Choice)
4.7/5
(46)
An open source software circuit level gateway is available from which of the following?
(Multiple Choice)
4.7/5
(32)
Which firewall denies or permits access based in part on data determined from previous packets in the conversation?
(Multiple Choice)
4.9/5
(37)
A firewall configuration using a server as a router and running multiple network interfaces with automatic routing disabled is an example of a:
(Multiple Choice)
4.8/5
(37)
The first rule of firewalls dictates that to provide the best security,they not only must be installed properly,but they must also be ____________ properly.
(Short Answer)
4.8/5
(30)
Which is a term used to refer to the process of authentication and verification?
(Multiple Choice)
4.7/5
(40)
In comparing a packet filter firewall with a stateful packet inspection firewall (SPI),the SPI firewall is:
(Multiple Choice)
5.0/5
(43)
Which firewall configuration would be appropriate within a network to separate and protect various subnets of a network to provide greater security?
(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 27
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)