Exam 6: Firewall Configuration and Administration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ firewalls are installed at all endpoints of the network, including the remote computers that connect to the network through VPNs.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

A

One of the disadvantages of a load-sharing setup is that total network performance declines.

Free
(True/False)
4.9/5
(31)
Correct Answer:
Verified

False

The firewall administrator should test the firewall and evaluate its performance to ensure that the network traffic is moving efficiently.

Free
(True/False)
4.7/5
(32)
Correct Answer:
Verified

True

____ provides a baseline index point for evaluating coverage of tools and services.

(Multiple Choice)
4.7/5
(37)

A ____ network monitors the operation of the primary firewall and synchronizes the state table connections so the two firewalls have the same information at any given time

(Multiple Choice)
5.0/5
(35)

____ is the hub for a large mailing list that features frequent announcements about security flaws.

(Multiple Choice)
4.8/5
(34)

With the ____ approach, the firewall determines the order in which the rules are processed.

(Multiple Choice)
4.9/5
(40)

If you decide to first restrict all transmissions through the gateway except a specific set of services, you are following the principle of ____.

(Multiple Choice)
4.9/5
(33)

The administrator should periodically review a firewall's ____________________ and analyze the traffic that passes through the firewall, paying particular attention to suspicious activity.

(Short Answer)
4.8/5
(33)

The formula for calculating memory usage for Check Point's FW-1 NG firewall is ____.

(Multiple Choice)
4.9/5
(28)

Match each item with a statement below. -Enables a packet to get from one network's OSI stack of interfaces to another.

(Multiple Choice)
4.7/5
(35)

Different types of hardware can be secured in different ways, but one of the most important ways is to ____.

(Multiple Choice)
4.9/5
(36)

What is a screen saver password? Why is it important?

(Essay)
4.8/5
(43)

The ____ approach processes firewall rules in top-to-bottom order.

(Multiple Choice)
4.9/5
(40)

Describe the Content Vectoring Protocol (CVP).

(Essay)
4.7/5
(32)

The ____ lets you extend their functionality and integrate virus scanning into their set of abilities.

(Multiple Choice)
4.9/5
(40)

It is good practice to set aside time to perform firewall maintenance ____.

(Multiple Choice)
4.8/5
(36)

Describe the need for firewall scalability.

(Essay)
4.8/5
(40)

Having a ____ password in place prevents someone from starting up your computer and accessing your hard disk files with a floppy disk called a boot disk.

(Multiple Choice)
5.0/5
(34)

List the critical resources for a firewall's successful operation.

(Essay)
4.7/5
(32)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)