Exam 12: Firewalls
Exam 1: Introduction44 Questions
Exam 2: Symmetric Encryption and Message Confidentiality29 Questions
Exam 3: Public-Key Cryptography and Message Authentication29 Questions
Exam 4: Key Distribution and User Authentication28 Questions
Exam 5: Network Access Control and Cloud Security45 Questions
Exam 6: Transport-Level Security30 Questions
Exam 7: Wireless Network Security45 Questions
Exam 8: Electronic Mail Security45 Questions
Exam 9: Ip Security45 Questions
Exam 10: Malicious Software45 Questions
Exam 11: Intruders30 Questions
Exam 12: Firewalls45 Questions
Select questions type
The direction control determines the types of Internet services that can be accessed, inbound or outbound.
(True/False)
4.8/5
(45)
Four types of firewalls are: Packet filtering, stateful inspection, circuit level proxy and _________ .
(Short Answer)
5.0/5
(37)
The default _________ policy increases ease of use for end users but provides reduced security because the security administrator must, in essence, react to each new security threat as it becomes known.
(Short Answer)
4.8/5
(40)
A circuit level proxy can be a stand alone system or it can be a specialized function performed by an application level gateway for certain applications.
(True/False)
4.8/5
(32)
A _________ sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host.Once the two connections are established TCP segments from one connection are relayed to the other without examining the contents.
(Short Answer)
4.8/5
(43)
An important aspect of a distributed firewall configuration is _________ .
(Multiple Choice)
4.8/5
(26)
The _________ is the address of the system that originated the IP packet.
(Multiple Choice)
4.8/5
(37)
_________ can be an effective means of protecting a local system or network of systems from network based security threats while at the same time affording access to the outside world via wide area networks and the Internet.
(Short Answer)
4.8/5
(32)
The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header.
(True/False)
4.8/5
(40)
The _________ attack is designed to circumvent filtering rules that depend on TCP header information.
(Multiple Choice)
4.9/5
(28)
________ has a third network interface on bastion to a DMZ where externally visible servers are placed.This is a common appliance configuration for medium to large organizations.
(Multiple Choice)
4.9/5
(37)
The _________ is the transport level port number which defines applications such as SNMP or TELNET.
(Multiple Choice)
4.9/5
(39)
Firewall functionality can also be implemented as a software module in a router or LAN switch.
(True/False)
4.8/5
(41)
An example of application level gateway implementation is the SOCKS package.
(True/False)
4.9/5
(42)
Due to the small number of variables used in access control decisions packet filter firewalls are susceptible to security breaches caused by improper configurations.
(True/False)
4.8/5
(42)
Common for large businesses and government organizations, the ________ configuration is required for Australian government use.
(Multiple Choice)
4.8/5
(38)
A __________ attack is where the source station specifies the route that a packet should take as it crosses the Internet in the hopes that this will bypass security measures that do not analyze the source routing information.
(Short Answer)
4.9/5
(22)
A typical use of a _________ is a situation in which the system administrator trusts the internal users.
(Multiple Choice)
4.9/5
(44)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)