Exam 3: Fundamentals of Firewalls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A firewall that uses a combination of approaches rather than a single approach to protect the network is called:

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

B

Once a circuit level gateway verifies the user's logon,it creates a virtual circuit between:

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

B

A ____________ firewall solution is actually a combination of several different firewall systems in a single system.

Free
(Short Answer)
4.8/5
(42)
Correct Answer:
Verified

hybrid

Identifying abnormal activity on a firewall requires that one establish a:

(Multiple Choice)
4.8/5
(31)

Which type of firewall is included in Windows XP and many distributions of Linux operating systems?

(Multiple Choice)
4.8/5
(37)

In many typical configurations with multiple firewalls,e-mail servers and FTP servers are located in the:

(Multiple Choice)
4.8/5
(31)

A term used to refer to the process of authentication and verification as accomplished on some gateways is ____________.

(Short Answer)
4.8/5
(34)

Taking security precautions such as keeping patches updated,uninstalling unneeded applications,closing unused ports,and turning off unused services is called ____________ the operating system.

(Short Answer)
4.7/5
(32)

Which type of firewall negotiates between the server and client to permit or deny connection based on the type of software and connection requested?

(Multiple Choice)
4.8/5
(41)

Which serves as a single contact point between the Internet and the private network?

(Multiple Choice)
4.9/5
(42)

At what OSI layer do packet filters function?

(Multiple Choice)
4.9/5
(34)

With a circuit level gateway in place,external users only see the IP address of the ____________.

(Short Answer)
5.0/5
(39)

How can vulnerability to flooding attacks be reduced with an application gateway?

(Multiple Choice)
4.7/5
(46)

An open source software circuit level gateway is available from which of the following?

(Multiple Choice)
4.7/5
(32)

Which firewall denies or permits access based in part on data determined from previous packets in the conversation?

(Multiple Choice)
4.9/5
(37)

A firewall configuration using a server as a router and running multiple network interfaces with automatic routing disabled is an example of a:

(Multiple Choice)
4.8/5
(37)

The first rule of firewalls dictates that to provide the best security,they not only must be installed properly,but they must also be ____________ properly.

(Short Answer)
4.8/5
(30)

Which is a term used to refer to the process of authentication and verification?

(Multiple Choice)
4.7/5
(40)

In comparing a packet filter firewall with a stateful packet inspection firewall (SPI),the SPI firewall is:

(Multiple Choice)
5.0/5
(43)

Which firewall configuration would be appropriate within a network to separate and protect various subnets of a network to provide greater security?

(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 27
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)