Exam 6: Firewall Configuration and Administration
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
____ firewalls are installed at all endpoints of the network, including the remote computers that connect to the network through VPNs.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
A
One of the disadvantages of a load-sharing setup is that total network performance declines.
Free
(True/False)
4.9/5
(31)
Correct Answer:
False
The firewall administrator should test the firewall and evaluate its performance to ensure that the network traffic is moving efficiently.
Free
(True/False)
4.7/5
(32)
Correct Answer:
True
____ provides a baseline index point for evaluating coverage of tools and services.
(Multiple Choice)
4.7/5
(37)
A ____ network monitors the operation of the primary firewall and synchronizes the state table connections so the two firewalls have the same information at any given time
(Multiple Choice)
5.0/5
(35)
____ is the hub for a large mailing list that features frequent announcements about security flaws.
(Multiple Choice)
4.8/5
(34)
With the ____ approach, the firewall determines the order in which the rules are processed.
(Multiple Choice)
4.9/5
(40)
If you decide to first restrict all transmissions through the gateway except a specific set of services, you are following the principle of ____.
(Multiple Choice)
4.9/5
(33)
The administrator should periodically review a firewall's ____________________ and analyze the traffic that passes through the firewall, paying particular attention to suspicious activity.
(Short Answer)
4.8/5
(33)
The formula for calculating memory usage for Check Point's FW-1 NG firewall is ____.
(Multiple Choice)
4.9/5
(28)
Match each item with a statement below.
-Enables a packet to get from one network's OSI stack of interfaces to another.
(Multiple Choice)
4.7/5
(35)
Different types of hardware can be secured in different ways, but one of the most important ways is to ____.
(Multiple Choice)
4.9/5
(36)
The ____ approach processes firewall rules in top-to-bottom order.
(Multiple Choice)
4.9/5
(40)
The ____ lets you extend their functionality and integrate virus scanning into their set of abilities.
(Multiple Choice)
4.9/5
(40)
It is good practice to set aside time to perform firewall maintenance ____.
(Multiple Choice)
4.8/5
(36)
Having a ____ password in place prevents someone from starting up your computer and accessing your hard disk files with a floppy disk called a boot disk.
(Multiple Choice)
5.0/5
(34)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)