Exam 6: Firewalls and Border Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Connection-oriented services occur between the ____________________ sublayer of the data-link layer (layer 2) and the network layer (layer 3) in the OSI model.

(Short Answer)
4.8/5
(36)

Do routers maintain information about network station addresses and network status in databases?

(True/False)
4.7/5
(43)

In the OSI model, what layer is the network layer?

(Multiple Choice)
4.7/5
(38)

  What is displayed in the figure above? What is displayed in the figure above?

(Multiple Choice)
4.8/5
(40)

UDP does not provide the same level of reliability and error checking as TCP, because it relies only on the ____________________ to ensure reliability.

(Short Answer)
4.8/5
(38)

What is the default subnet mask for a Class D network?

(Multiple Choice)
4.8/5
(41)

Red Hat Linux 9.x offers the ____________________ interface for configuring NAT and complex firewall security from the command line in a terminal window.

(Short Answer)
4.8/5
(43)

What four fields does a UDP header contain?

(Essay)
4.9/5
(36)

The payload data within the IP packet is actually the TCP header and the application data when connection-oriented services are used.

(True/False)
5.0/5
(38)

A router performs packet filtering and is often used as a firewall on a network, in addition to the other functions it performs.

(True/False)
4.8/5
(36)

When a TCP segment is formatted with the additional IP header information, the entire unit is called a(n) ____________________ or packet.

(Short Answer)
4.8/5
(37)

When using the Red Hat Linux 9.x Security Level Configuration tool, which security level only allows connections for using DNS and DHCP services?

(Multiple Choice)
4.8/5
(34)

Does NetBEUI use the type of addressing that would enable it to be forwarded or routed to networks other than the one on which it is used?

(True/False)
4.8/5
(28)

  What is displayed in the figure above? What is displayed in the figure above?

(Multiple Choice)
4.8/5
(33)

What are the three component protocols within the TCP/IP protocol suite?

(Essay)
4.9/5
(36)

Some proxies are able to provide caching services as a way to reduce the load on servers within the internal network.

(True/False)
4.8/5
(42)

Class D addresses do not reflect the network size, but only tell you that the communication is a multicast.

(True/False)
4.9/5
(40)

TCP (and UDP) ____________________ software may be used to simply collect information about a target, without the target's knowledge; it may be used to gain access to a system, or it may be used to crash a system.

(Short Answer)
4.9/5
(37)

What are the four ways to perform network address translation?

(Essay)
4.7/5
(33)

If you had configured a firewall in Windows XP and were concerned that you had been the victim of an attack, where would you look to be able to find out this information?

(Multiple Choice)
4.9/5
(35)
Showing 41 - 60 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)