Exam 4: Firewall Technologies and Administration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below. a.Commercial-grade firewall f.Application-level gateway b.Dual-homed host firewall g.URL filtering c.Packet-filtering firewall h.Circuit-level gateway d.Stateless packet filtering i.Firewall appliances e.Stateful packet filtering -Examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.

(Short Answer)
4.8/5
(27)

Briefly describe how firewalls affect the transmission of packets within Internet Protocol (IP).

(Essay)
4.8/5
(23)

Why is the order of firewall rules important?

(Essay)
4.8/5
(30)

Known as the ping service, use of ____ traffic is a common method for hacker reconnaissance and should be turned off to prevent snooping.

(Multiple Choice)
4.7/5
(36)

At the Network layer, ____ are used to encapsulate packets (or datagrams).

(Multiple Choice)
4.8/5
(36)

For a single home user who regularly surfs the Web, exchanges e-mail, and uses instant messaging, a firewall's primary job is to keep viruses from infecting files and prevent Trojan horses from entering the system through hidden openings called ____________________.

(Short Answer)
4.9/5
(34)

The ____ process can be performed at the firewall and make use of encryption to protect credentials transmitted from client to server (or client to firewall).

(Multiple Choice)
4.7/5
(36)

Compare the concept of defense-in-depth and the principle of least privilege.

(Essay)
4.8/5
(38)

A computer firewall is designed to prevent all attackers, viruses, and would-be intruders from entering a computer or computer network.

(True/False)
4.7/5
(40)

A(n) ____ is an ideal endpoint for VPN, which connects two companies' networks over the Internet.

(Multiple Choice)
4.8/5
(34)

It is sometimes easier to protect a network from the Internet than from an inside attack.

(True/False)
4.7/5
(34)

What protocol breaks a message into numbered segments so that it can be transmitted?

(Multiple Choice)
4.9/5
(26)

A(n) ____________________ is an extended network that shares part of an organization's network with a third party.

(Short Answer)
4.7/5
(35)

Match each item with a statement below. a.Commercial-grade firewall f.Application-level gateway b.Dual-homed host firewall g.URL filtering c.Packet-filtering firewall h.Circuit-level gateway d.Stateless packet filtering i.Firewall appliances e.Stateful packet filtering -Create tunnels connecting specific processes or systems on each side of the firewall and then allow only authorized traffic, such as a specific type of TCP connection for authorized users, in these tunnels.

(Short Answer)
4.9/5
(39)

Match each item with a statement below. a.Commercial-grade firewall f.Application-level gateway b.Dual-homed host firewall g.URL filtering c.Packet-filtering firewall h.Circuit-level gateway d.Stateless packet filtering i.Firewall appliances e.Stateful packet filtering -Firewall packet inspection that ignores the state of the connection between the internal computer and the external computer.

(Short Answer)
4.8/5
(51)

A(n) ____ tracks the state and context of each packet in the conversation by recording which station sent what packet and when.

(Multiple Choice)
4.9/5
(40)

A ____ is a network subaddress (assigned a number between 0 and 65,535) through which a particular type of data is allowed to pass.

(Multiple Choice)
4.8/5
(39)

Even simple residential firewalls can be used to create a logical screened subnetwork (often called a ____) that can provide Web services.

(Multiple Choice)
4.8/5
(37)

Define jump rules and explain how they work.

(Essay)
4.9/5
(38)

Define and compare well-known ports and ephemeral ports.

(Essay)
4.8/5
(29)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)