Exam 4: Introduction to Firewalls
What components are commonly found in a firewall?
A firewall can contain many components, including a packet filter, a proxy server, an authentication system, and software that perform Network or Port Address Translation (NAT or PAT).Some firewalls can encrypt traffic, and some help establish VPNs.Some firewalls are packaged in a hardware device that also functions as a router.Firewalls themselves are often part of multiple-component security setups.The most effective protection systems used by large corporate networks employ not just one but several firewalls.They combine the firewalls with routers and other components to delineate zones of trust such as a screened subnet, also known as a demilitarized zone (DMZ), which is positioned between the internal network and the outside world.
To someone on the Internet or another outside network, it appears that all information is coming from a single computer when ____ is used.
A
The OSI networking model has ____________________ layers.
seven
7
Match each item with a statement below.
-Segment of the DMZ where additional authentication and authorization controls are put into place to provide services that are not available to the general public.
Match each item with a statement below.
-Network subaddress through which a particular type of data is allowed to pass.
Match each item with a statement below.
-Determining whether to allow or deny the passage of packets of digital information, based on established security policy rules.
Third-generation, stateful inspection firewalls monitor network connections between internal and external systems using ____.
A network that needs to connect to the Internet might have a ____ host and a service network.
"____________________" refers to the era of technology a firewall evolved in.
A ____ contains the source's IP and port as well as the destination's IP and port, and it also provides information on the total time in seconds, the time remaining in seconds, and the protocol used (UDP or TCP).
The combination of a sender's full address (network address plus port) and receiver's address (network address plus port) makes up a ____.
Application gateways function at the ____ layer of the OSI model.
Match each item with a statement below.
-Information you view and use.
Match each item with a statement below.
-Boundary between two zones of trust.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)