Exam 7: Working With Proxy Servers and Application-Level Firewalls
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
Match each item with a statement below.
-Maintain records of events such as logon attempts and accesses to files.
(Multiple Choice)
4.9/5
(41)
____ is a method of using multiple systems to take turns handling requests, to prevent any one system from getting overloaded.
(Multiple Choice)
4.8/5
(34)
As the number of users on the network grows, the machine that hosts the proxy server should be upgraded.
(True/False)
4.8/5
(34)
Match each item with a statement below.
-Defined pieces of packet or system data
(Multiple Choice)
4.8/5
(43)
Because a proxy server ____ all packets that pass between the Internet and the internal hosts, attacks that can start with mangled packet data never reach the internal host.
(Multiple Choice)
4.8/5
(26)
Match each item with a statement below.
-Set of protocols that enable proxy server access to applications without an assigned proxy server.
(Multiple Choice)
4.8/5
(37)
Microsoft ____________________ is a complex, full-featured firewall that includes stateful packet filtering as well as proxy services, NAT, and intrusion detection.
(Short Answer)
4.8/5
(32)
To enhance security, firewall rules can be used along with a proxy server to ____.
(Multiple Choice)
4.9/5
(38)
Log files can point to ports, machines, or other vulnerable computers through which hackers can gain entry.These entry points are known as ____.
(Multiple Choice)
4.8/5
(34)
Network administrators ____ to set up the browsers on the network to use a proxy server.
(Multiple Choice)
5.0/5
(37)
A ____ firewall combines several different security technologies, such as packet filtering, application-level gateways, and VPNs.
(Multiple Choice)
4.8/5
(37)
In a typical transaction, a proxy server intercepts a request from a user on the internal network and passes it along to a destination computer on the Internet.What steps are involved in this process?
(Essay)
4.9/5
(36)
Squid is a full-featured Windows-based firewall that performs access control and filtering and is especially good at quickly serving cached files..
(True/False)
4.8/5
(32)
Match each item with a statement below.
-A very popular proxy server for home and small business environments.
(Multiple Choice)
4.7/5
(34)
It is good practice to dedicate a proxy server to one ____________________.
(Short Answer)
4.8/5
(30)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)