Exam 6: Firewalls
Exam 1: The Threat Environment69 Questions
Exam 2: Planning and Policy105 Questions
Exam 3: Cryptography101 Questions
Exam 4: Secure Networks81 Questions
Exam 5: Access Control63 Questions
Exam 6: Firewalls68 Questions
Exam 7: Host Hardening78 Questions
Exam 8: Application Security67 Questions
Exam 9: Data Protection69 Questions
Exam 10: Incident and Disaster Response67 Questions
Exam 11: Module a Networking Concepts79 Questions
Select questions type
Instead of talking about periods or phases, computer scientists use the term "state."
Free
(True/False)
4.9/5
(37)
Correct Answer:
True
Port numbers ranging from 49151 to 65535 are ________.
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
C
Which of the following can be described as a particular temporal period during a connection?
Free
(Multiple Choice)
4.8/5
(45)
Correct Answer:
C
The earliest type of border firewalls used static packet filtering.
(True/False)
4.8/5
(32)
Nearly all corporate border firewalls use the ________ filtering method.
(Multiple Choice)
4.7/5
(31)
By various accounts, it is estimated that ________ percent of all misbehavior is done by employees working within a site.
(Multiple Choice)
4.9/5
(41)
________ firewalls handle traditional firewall processing, antivirus filtering, and spam filtering.
(Multiple Choice)
4.8/5
(35)
Which of the following is FALSE about stateful packet inspection firewalls?
(Multiple Choice)
4.9/5
(39)
NAT firewalls translate both network addresses (IP addresses) and port addresses.
(True/False)
4.9/5
(40)
________ is used in firewalls that use various types of examination methods as a second type of protection.
(Multiple Choice)
4.9/5
(37)
A static packet filtering firewall can stop incoming packets with spoofed source IP addresses.
(True/False)
4.7/5
(37)
Anomaly detection tends to generate so many false positives that many firms will not use it.
(True/False)
4.8/5
(37)
Companies should assume that an increasing number of attacks will reach their internal clients and servers.
(True/False)
4.7/5
(33)
Signature-based detection is less accurate than anomaly detection.
(True/False)
4.9/5
(29)
________ can examine outgoing packets from an internal client to the external webserver to detect client misbehavior.
(Multiple Choice)
4.9/5
(38)
________ uses specific examination methods depending on the state of the connection.
(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 68
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)