Exam 4: Firewall Technologies and Administration
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
Match each item with a statement below.
a.Commercial-grade firewall
f.Application-level gateway
b.Dual-homed host firewall
g.URL filtering
c.Packet-filtering firewall
h.Circuit-level gateway
d.Stateless packet filtering
i.Firewall appliances
e.Stateful packet filtering
-Examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.
(Short Answer)
4.8/5
(27)
Briefly describe how firewalls affect the transmission of packets within Internet Protocol (IP).
(Essay)
4.8/5
(23)
Known as the ping service, use of ____ traffic is a common method for hacker reconnaissance and should be turned off to prevent snooping.
(Multiple Choice)
4.7/5
(36)
At the Network layer, ____ are used to encapsulate packets (or datagrams).
(Multiple Choice)
4.8/5
(36)
For a single home user who regularly surfs the Web, exchanges e-mail, and uses instant messaging, a firewall's primary job is to keep viruses from infecting files and prevent Trojan horses from entering the system through hidden openings called ____________________.
(Short Answer)
4.9/5
(34)
The ____ process can be performed at the firewall and make use of encryption to protect credentials transmitted from client to server (or client to firewall).
(Multiple Choice)
4.7/5
(36)
Compare the concept of defense-in-depth and the principle of least privilege.
(Essay)
4.8/5
(38)
A computer firewall is designed to prevent all attackers, viruses, and would-be intruders from entering a computer or computer network.
(True/False)
4.7/5
(40)
A(n) ____ is an ideal endpoint for VPN, which connects two companies' networks over the Internet.
(Multiple Choice)
4.8/5
(34)
It is sometimes easier to protect a network from the Internet than from an inside attack.
(True/False)
4.7/5
(34)
What protocol breaks a message into numbered segments so that it can be transmitted?
(Multiple Choice)
4.9/5
(26)
A(n) ____________________ is an extended network that shares part of an organization's network with a third party.
(Short Answer)
4.7/5
(35)
Match each item with a statement below.
a.Commercial-grade firewall
f.Application-level gateway
b.Dual-homed host firewall
g.URL filtering
c.Packet-filtering firewall
h.Circuit-level gateway
d.Stateless packet filtering
i.Firewall appliances
e.Stateful packet filtering
-Create tunnels connecting specific processes or systems on each side of the firewall and then allow only authorized traffic, such as a specific type of TCP connection for authorized users, in these tunnels.
(Short Answer)
4.9/5
(39)
Match each item with a statement below.
a.Commercial-grade firewall
f.Application-level gateway
b.Dual-homed host firewall
g.URL filtering
c.Packet-filtering firewall
h.Circuit-level gateway
d.Stateless packet filtering
i.Firewall appliances
e.Stateful packet filtering
-Firewall packet inspection that ignores the state of the connection between the internal computer and the external computer.
(Short Answer)
4.8/5
(51)
A(n) ____ tracks the state and context of each packet in the conversation by recording which station sent what packet and when.
(Multiple Choice)
4.9/5
(40)
A ____ is a network subaddress (assigned a number between 0 and 65,535) through which a particular type of data is allowed to pass.
(Multiple Choice)
4.8/5
(39)
Even simple residential firewalls can be used to create a logical screened subnetwork (often called a ____) that can provide Web services.
(Multiple Choice)
4.8/5
(37)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)