Exam 10: Firewall Design and Management
Exam 1: Network Security Fundamentals50 Questions
Exam 2: TCP-IP50 Questions
Exam 3: Network Traffic Signatures49 Questions
Exam 4: Routing Fundamentals50 Questions
Exam 5: Cryptography50 Questions
Exam 6: Wireless Network Fundamentals50 Questions
Exam 7: Understanding Wireless Security50 Questions
Exam 8: Intrusion Detection and Prevention Systems50 Questions
Exam 9: Firewalls50 Questions
Exam 10: Firewall Design and Management50 Questions
Exam 11: VPN Concepts50 Questions
Exam 12: Internet and World Wide Web Security50 Questions
Exam 13: Security Policy Design and Implementation50 Questions
Exam 14: On-Going Security Management50 Questions
Select questions type
Which of the following is true about private IP addresses?
Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
B
Which network device works at the Application layer by reconstructing packets and forwarding them to Web servers?
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
C
Which type of firewall configuration protects public servers by isolating them from the internal network?
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
A
What do you call a firewall that is connected to the Internet,the internal network,and the DMZ?
(Multiple Choice)
4.7/5
(37)
What is the term used for a computer placed on the network perimeter that is meant to attract attackers?
(Multiple Choice)
4.8/5
(25)
MATCHING
-a firewall with separate interfaces connected to an untrusted network,a semitrusted network,and a trusted network
(Multiple Choice)
4.8/5
(32)
The TCP normalization feature forwards abnormal packets to an administrator for further inspection.
(True/False)
4.8/5
(43)
Which type of security device can speed up Web page retrieval and shield hosts on the internal network?
(Multiple Choice)
4.8/5
(32)
What should you consider installing if you want to inspect packets as they leave the network?
(Multiple Choice)
4.8/5
(28)
Describe the process of network address translation.What are the two primary types of NAT?
(Essay)
4.7/5
(28)
Reverse firewalls allow all incoming traffic except what the ACLs are configured to deny.
(True/False)
4.8/5
(30)
MATCHING
-a process that uses the source and destination TCP and UDP port addresses to map traffic between internal and external hosts
(Multiple Choice)
4.9/5
(39)
What is a critical step you should take on the OS you choose for a bastion host?
(Multiple Choice)
4.8/5
(22)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)