Exam 5: Packet Filtering
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
Match each item with a statement below.
-The most common packet filter.
(Multiple Choice)
4.8/5
(35)
Match each item with a statement below.
-Consists of two parts: the header and the data.
(Multiple Choice)
4.8/5
(34)
Match each item with a statement below.
-Standalone hardware and software devices that have self-contained components.
(Multiple Choice)
4.7/5
(37)
Enabling external hosts to connect to your public servers in the DMZ, but not to hosts in the internal LAN, is an example of filtering on the ____.
(Multiple Choice)
5.0/5
(39)
The header field that indicates whether the packet is a fragment is ____.
(Multiple Choice)
4.8/5
(30)
Stateless packet filtering is more secure than stateful packet filtering.
(True/False)
4.9/5
(28)
Packet-filter rules must account for all possible ports that a type of communication might use or for all variations within a particular protocol.
(True/False)
4.9/5
(35)
How can a stateful packet filter determine whether a session is beginning or ending?
(Essay)
4.7/5
(38)
The header field that can contain a security field, which enables the sender to assign a classification level to the packet is ____.
(Multiple Choice)
4.8/5
(36)
Match each item with a statement below.
-Identifies the IP protocol that was used in the data portion of the packet and should receive the data at its destination
(Multiple Choice)
4.8/5
(40)
Why might a small-scale software-only personal firewall cause problems in a network situation?
(Essay)
4.9/5
(40)
List and describe the types of hardware devices and software programs that perform packet filtering.
(Essay)
4.7/5
(39)
Match each item with a statement below.
-Packets that can be easily forged and used to redirect other communications.
(Multiple Choice)
4.9/5
(36)
Packet filters examine packet headers and packet data when applying allow and deny rules.
(True/False)
4.8/5
(30)
Match each item with a statement below.
-16-bit value aids in the division of the data stream into packets of information.
(Multiple Choice)
4.9/5
(29)
Using TCP or UDP port numbers can help you filter a wide variety of information, including SMTP and POP e-mail messages, NetBIOS sessions, ____, and Network News Transfer Protocol (NNTP) newsgroup sessions.
(Multiple Choice)
4.9/5
(31)
One of the first IP header criteria you can filter on is the packet's ____.
(Multiple Choice)
4.8/5
(40)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)