Exam 6: Firewalls and Border Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In a TCP header, the ____________________ is a 16-bit CRC that is computed by adding the length of all header fields plus the length of the data payload field. 6

Free
(Short Answer)
4.8/5
(40)
Correct Answer:
Verified

checksum

Which of the following is the loopback address?

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

D

Packet filtering is accomplished using one of two techniques: stateless filtering and stateful filtering.

Free
(True/False)
4.8/5
(33)
Correct Answer:
Verified

True

Firewalls provide border security by using three different approaches. What are they?

(Essay)
4.7/5
(28)

When using classful addressing, the IP address 122.16.232.4 belongs to which network class?

(Multiple Choice)
4.8/5
(33)

A newer way to ignore address class designation is by using ______________________________ addressing, which puts a slash (/) after the dotted decimal notation.

(Short Answer)
4.8/5
(38)

Which type of packet filtering tracks information about a communication session, such as which ports are in use, drawing from the contents of multiple packets?

(Multiple Choice)
4.9/5
(33)

When a server is set up for ______________________________, it performs address translation between the local network clients (including the server as an Internet user) and the Internet.

(Short Answer)
4.9/5
(38)

Which type of NAT is used when the firewall is connected to multiple public networks or Internet service providers, and thus there is a range of different decoy addresses used for each external network?

(Multiple Choice)
4.9/5
(31)

IPTables is a powerful tool that can be used to implement network security in many ways; it is configured through a terminal window using the iptables command.

(True/False)
4.9/5
(33)

What protocol was used extensively for versions of NetWare prior to version 5?

(Multiple Choice)
4.8/5
(40)

What are the six ways that a metric can be calculated?

(Essay)
4.9/5
(42)

Which of the following can be used to calculate a metric?

(Multiple Choice)
4.7/5
(26)

Which of the following can port-scanning software be used for?

(Multiple Choice)
4.8/5
(39)

When an application on a network station uses a(n) ____________________ packet (which is the most typical packet used by an application), one copy of each packet in a transmission is sent to each destination intended to receive the packet.

(Short Answer)
4.7/5
(35)

Which of the following TCP/UDP ports is used for DNS server applications?

(Multiple Choice)
4.8/5
(33)

What five services are part of Windows Server 2003 Routing and Remote Access Services?

(Essay)
4.8/5
(25)

Does RIP have the ability to send only routing updates to other routers instead of the entire routing table?

(True/False)
4.8/5
(33)

What is the length of the sequence number that TCP uses to ensure that all frames are received?

(Multiple Choice)
4.9/5
(41)

What is the minimum length of a TCP header?

(Multiple Choice)
4.7/5
(34)
Showing 1 - 20 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)