Exam 5: Packet Filtering
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
Firewall ____ indicate whether a large number of echo messages are being received.
(Multiple Choice)
4.8/5
(32)
The ____ describes the length of the packet header in 32-bit words and is a 4 bit value.
(Multiple Choice)
4.9/5
(39)
A stateless filter compares the header data against its ____ and forwards each packet as a rule is found to match the specifics of that packet.
(Multiple Choice)
4.8/5
(40)
One type of network protocol attack takes advantage of the ICMP Echo Request message type by flooding a target computer with ICMP echo requests.
(True/False)
4.8/5
(28)
The problem with fragmentation is that because the TCP or UDP port number is provided only at the beginning of a packet, it appears ____.
(Multiple Choice)
4.9/5
(42)
ICMP message type ____ indicates that a faster route has been located.
(Multiple Choice)
4.8/5
(35)
____ packet filters are useful for completely blocking traffic from a subnet or other network.
(Multiple Choice)
4.7/5
(40)
Match each item with a statement below.
-Originally developed as a means of enabling large packets to pass through early routers that had frame size limitations.
(Multiple Choice)
4.8/5
(27)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)