Exam 6: Firewall Configuration and Administration
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
The cornerstone of most firewalls is the ____, a set of instructions based on organizational policy, configured by the administrator.
(Multiple Choice)
4.8/5
(25)
Match each item with a statement below.
-Set of rules that blocks all access by default, and then permits only specific types of traffic to pass through.
(Multiple Choice)
4.9/5
(38)
A critical ____________________ is defined as a software- or hardware-related item that is indispensable to the operation of a device or program.
(Short Answer)
4.8/5
(34)
The even distribution of traffic among two or more load-sharing firewalls can be achieved through the use of ____________________ switches, which are network devices with the intelligence to make routing decisions based on source and destination IP address or port numbers as specified in Layer 4 of the OSI reference model.
(Short Answer)
4.7/5
(31)
Match each item with a statement below.
-Tell the firewall what types of traffic to let in and out of your network.
(Multiple Choice)
4.8/5
(42)
Computer systems have failed when critical computers were placed on the top floor of buildings that were poorly air conditioned.
(True/False)
4.8/5
(30)
A(n) ____ approach allows all packets to pass through except those specified to be blocked.
(Multiple Choice)
4.9/5
(34)
Match each item with a statement below.
-Must be entered to complete the process of starting up a computer.
(Multiple Choice)
4.9/5
(45)
Many companies use the Internet to enable a(n) ____________________ that connects internal hosts with specific clients in other organizations.
(Short Answer)
4.9/5
(31)
If a proxy server is in service, ____ should be disabled on routers and other devices that lie between the networks.
(Multiple Choice)
4.8/5
(34)
____ of frequently accessed resources, such as Web page text and image files, can dramatically speed up the performance of your network because it reduces the load on your Web servers.
(Multiple Choice)
4.8/5
(34)
A firewall must be ____ so its performance can grow along with the network it protects.
(Multiple Choice)
5.0/5
(29)
Match each item with a statement below.
-Primary intent is to let all traffic through and then block specific types of traffic.
(Multiple Choice)
4.8/5
(33)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)