Exam 6: Firewalls and Border Security
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
IP is a connection-oriented protocol because its primary mission is to provide network-to-network addressing and routing information, and to change the size of packets when the size varies from network to network.
(True/False)
4.8/5
(47)
Which type of proxy stores recently made service requests, allowing them to fulfill an individual client's request without needing to contact the server on the internal network?
(Multiple Choice)
4.9/5
(31)
Which of the following is performed by UDP to provide communication reliability?
(Multiple Choice)
4.9/5
(33)
UDP does not provide the same level of reliability and error checking as TCP, because it relies only on the checksum to ensure reliability.
(True/False)
4.8/5
(36)
Can routers filter packets on the basis of information associated with each port (inbound and outbound connections) to control network traffic?
(True/False)
4.9/5
(34)
Match the following terms to the appropriate definition.
Correct Answer:
Premises:
Responses:
(Matching)
5.0/5
(44)
Is Internet Connection Firewall available in Windows Server 2003, Enterprise Edition?
(True/False)
4.9/5
(45)
One element in border security is to configure security policies on each firewall so that access is automatically allowed, except for those who are manually configured to have access blocked through the firewall.
(True/False)
4.8/5
(35)
There are six IP address classes, Class A through Class F, each used with a different type of network.
(True/False)
4.9/5
(41)
The border router is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.
(True/False)
4.9/5
(40)
What five border points should be protected by a strong border security design?
(Essay)
4.7/5
(41)
IPTables is used to configure firewall and NAT activities in which of the following operating systems?
(Multiple Choice)
4.9/5
(38)
Which of the following TCP/UDP ports is used for NetBIOS applications?
(Multiple Choice)
4.8/5
(38)
The simplest way to configure a firewall in Red Hat Linux 9.x is by using the Security Level Configuration tool.
(True/False)
4.9/5
(32)
Which TCP field is used when there is too little or no optional data to complete the required header length, which must be divisible by 32?
(Multiple Choice)
4.8/5
(51)
When two devices communicate using connection-oriented methods, do they establish sequence numbers for each frame that is transmitted and place the sequence number in the frame header?
(True/False)
4.8/5
(30)
Showing 21 - 40 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)