Exam 6: Security Technology: Access Controls, Firewalls, and Vpns

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Content filters are often called ____________________ firewalls.

(Short Answer)
4.9/5
(44)

Syntax errors in firewall policies are usually difficult to identify.

(True/False)
4.8/5
(39)

__________ filtering requires that the firewall's filtering rules for allowing and denying packets are developed and installed with the firewall.

(Multiple Choice)
4.8/5
(38)

Some firewalls can filter packets by protocol name.

(True/False)
4.8/5
(27)

Telnet protocol packets usually go to TCP port __________, whereas SMTP packets go to port __________.

(Multiple Choice)
4.9/5
(44)

When Web services are offered outside the firewall, HTTP traffic should be denied from reaching your internal networks through the use of some form of proxy access or DMZ architecture.

(Essay)
4.8/5
(40)

Simple Mail Transport Protocol (SMTP) data is allowed to pass through the firewall, but it should all be routed to a well-configured SMTP gateway to filter and route messaging traffic securely.

(Short Answer)
5.0/5
(31)

The firewall device must never be accessible directly from the ____________________ network.

(Short Answer)
4.8/5
(33)

A(n) ____________________ is a combination of hardware and software that filters or prevents specific information from moving between the outside world and the inside world.

(Short Answer)
4.9/5
(34)

The firewall device is never directly accessible from the public network for configuration or management purposes.

(Essay)
4.8/5
(35)

Internet connections via dial-up lines are regaining popularity due to recent technological developments.

(True/False)
4.8/5
(40)

Access control is achieved by means of a combination of policies, programs, and technologies. _________________________

(True/False)
4.9/5
(35)

A content filter is essentially a set of scripts or programs that restricts user access to certain networking protocols and Internet locations.

(True/False)
4.9/5
(27)

When a bastion host approach is used, the host contains two NICs, forcing all traffic to go through the device. _________________________

(True/False)
4.8/5
(38)

A(n) ____________________ filter is a software filter-technically not a firewall-that allows administrators to restrict access to content from within a network.

(Short Answer)
4.8/5
(30)

SESAME, as described in RFC 4120, keeps a database containing the private keys of clients and servers-in the case of a client, this key is simply the client's encrypted password. _________________________

(True/False)
4.9/5
(42)

Firewalls can be categorized by processing mode, development era, or structure.

(True/False)
4.8/5
(35)
Showing 101 - 117 of 117
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)