Exam 6: Firewalls and Border Security
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
In a TCP header, the ____________________ is a 16-bit CRC that is computed by adding the length of all header fields plus the length of the data payload field. 6
Free
(Short Answer)
4.8/5
(40)
Correct Answer:
checksum
Which of the following is the loopback address?
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
D
Packet filtering is accomplished using one of two techniques: stateless filtering and stateful filtering.
Free
(True/False)
4.8/5
(33)
Correct Answer:
True
Firewalls provide border security by using three different approaches. What are they?
(Essay)
4.7/5
(28)
When using classful addressing, the IP address 122.16.232.4 belongs to which network class?
(Multiple Choice)
4.8/5
(33)
A newer way to ignore address class designation is by using ______________________________ addressing, which puts a slash (/) after the dotted decimal notation.
(Short Answer)
4.8/5
(38)
Which type of packet filtering tracks information about a communication session, such as which ports are in use, drawing from the contents of multiple packets?
(Multiple Choice)
4.9/5
(33)
When a server is set up for ______________________________, it performs address translation between the local network clients (including the server as an Internet user) and the Internet.
(Short Answer)
4.9/5
(38)
Which type of NAT is used when the firewall is connected to multiple public networks or Internet service providers, and thus there is a range of different decoy addresses used for each external network?
(Multiple Choice)
4.9/5
(31)
IPTables is a powerful tool that can be used to implement network security in many ways; it is configured through a terminal window using the iptables command.
(True/False)
4.9/5
(33)
What protocol was used extensively for versions of NetWare prior to version 5?
(Multiple Choice)
4.8/5
(40)
Which of the following can port-scanning software be used for?
(Multiple Choice)
4.8/5
(39)
When an application on a network station uses a(n) ____________________ packet (which is the most typical packet used by an application), one copy of each packet in a transmission is sent to each destination intended to receive the packet.
(Short Answer)
4.7/5
(35)
Which of the following TCP/UDP ports is used for DNS server applications?
(Multiple Choice)
4.8/5
(33)
What five services are part of Windows Server 2003 Routing and Remote Access Services?
(Essay)
4.8/5
(25)
Does RIP have the ability to send only routing updates to other routers instead of the entire routing table?
(True/False)
4.8/5
(33)
What is the length of the sequence number that TCP uses to ensure that all frames are received?
(Multiple Choice)
4.9/5
(41)
Showing 1 - 20 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)