Exam 4: Firewall Technologies and Administration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe how packet-filtering routers can be configured to lower an organization's risk from external attack.

(Essay)
4.8/5
(24)

A(n) ____________________ is a boundary between two zones of trust.

(Short Answer)
4.7/5
(38)

Which application-level gateway task provides the benefit to an internal network of shielding actual internal IP addresses from the prying eyes of unauthorized external clients?

(Multiple Choice)
4.9/5
(36)

What is one of the most effective methods for improving computing security in the SOHO setting?

(Multiple Choice)
4.8/5
(39)

Match each item with a statement below. a.Commercial-grade firewall f.Application-level gateway b.Dual-homed host firewall g.URL filtering c.Packet-filtering firewall h.Circuit-level gateway d.Stateless packet filtering i.Firewall appliances e.Stateful packet filtering -Stand-alone, self-contained combinations of computing hardware and software.

(Short Answer)
4.9/5
(29)

The dominant firewall architecture used today is the screened subnet firewall.

(True/False)
4.9/5
(24)

You should block packets that use ports below 20.

(True/False)
4.7/5
(34)

The architecture of a screened subnet firewall provides a ____.

(Multiple Choice)
4.8/5
(33)

At the Physical layer, data is referred to as a ____.

(Multiple Choice)
4.8/5
(43)

Which firewall architecture combines the packet-filtering router with a separate, dedicated firewall, such as an application proxy server?

(Multiple Choice)
4.9/5
(35)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)