Exam 6: Firewall Configuration and Administration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The cornerstone of most firewalls is the ____, a set of instructions based on organizational policy, configured by the administrator.

(Multiple Choice)
4.8/5
(25)

Match each item with a statement below. -Set of rules that blocks all access by default, and then permits only specific types of traffic to pass through.

(Multiple Choice)
4.9/5
(38)

A critical ____________________ is defined as a software- or hardware-related item that is indispensable to the operation of a device or program.

(Short Answer)
4.8/5
(34)

The even distribution of traffic among two or more load-sharing firewalls can be achieved through the use of ____________________ switches, which are network devices with the intelligence to make routing decisions based on source and destination IP address or port numbers as specified in Layer 4 of the OSI reference model.

(Short Answer)
4.7/5
(31)

Match each item with a statement below. -Tell the firewall what types of traffic to let in and out of your network.

(Multiple Choice)
4.8/5
(42)

Any firewall hardware can support a proxy server.

(True/False)
4.8/5
(24)

Computer systems have failed when critical computers were placed on the top floor of buildings that were poorly air conditioned.

(True/False)
4.8/5
(30)

A(n) ____ approach allows all packets to pass through except those specified to be blocked.

(Multiple Choice)
4.9/5
(34)

Match each item with a statement below. -Must be entered to complete the process of starting up a computer.

(Multiple Choice)
4.9/5
(45)

What is IP forwarding?

(Essay)
4.7/5
(35)

Many companies use the Internet to enable a(n) ____________________ that connects internal hosts with specific clients in other organizations.

(Short Answer)
4.9/5
(31)

What are the GAISP nine Pervasive Principles?

(Essay)
4.7/5
(37)

In 2003, GASSP was succeeded by ____.

(Multiple Choice)
4.8/5
(29)

What is an intrusion detection and prevention system?

(Essay)
4.9/5
(33)

If a proxy server is in service, ____ should be disabled on routers and other devices that lie between the networks.

(Multiple Choice)
4.8/5
(34)

____ of frequently accessed resources, such as Web page text and image files, can dramatically speed up the performance of your network because it reduces the load on your Web servers.

(Multiple Choice)
4.8/5
(34)

Describe the importance of the bastion host's performance.

(Essay)
4.8/5
(36)

A firewall must be ____ so its performance can grow along with the network it protects.

(Multiple Choice)
5.0/5
(29)

How should a firewall administrator guard against new risks?

(Essay)
4.9/5
(33)

Match each item with a statement below. -Primary intent is to let all traffic through and then block specific types of traffic.

(Multiple Choice)
4.8/5
(33)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)