Exam 7: Working With Proxy Servers and Application-Level Firewalls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below. -Maintain records of events such as logon attempts and accesses to files.

(Multiple Choice)
4.9/5
(41)

____ is a method of using multiple systems to take turns handling requests, to prevent any one system from getting overloaded.

(Multiple Choice)
4.8/5
(34)

How can a proxy server be used for e-mail protection?

(Essay)
4.8/5
(39)

As the number of users on the network grows, the machine that hosts the proxy server should be upgraded.

(True/False)
4.8/5
(34)

Match each item with a statement below. -Defined pieces of packet or system data

(Multiple Choice)
4.8/5
(43)

How do reverse proxy servers work?

(Essay)
4.8/5
(39)

Because a proxy server ____ all packets that pass between the Internet and the internal hosts, attacks that can start with mangled packet data never reach the internal host.

(Multiple Choice)
4.8/5
(26)

Match each item with a statement below. -Set of protocols that enable proxy server access to applications without an assigned proxy server.

(Multiple Choice)
4.8/5
(37)

What is the most important benefit of a proxy server?

(Essay)
4.8/5
(31)

Microsoft ____________________ is a complex, full-featured firewall that includes stateful packet filtering as well as proxy services, NAT, and intrusion detection.

(Short Answer)
4.8/5
(32)

To enhance security, firewall rules can be used along with a proxy server to ____.

(Multiple Choice)
4.9/5
(38)

How should organizations cope with proxy server slowdown?

(Multiple Choice)
4.8/5
(36)

URLs are blocked on a proxy server as ____.

(Multiple Choice)
4.7/5
(40)

Log files can point to ports, machines, or other vulnerable computers through which hackers can gain entry.These entry points are known as ____.

(Multiple Choice)
4.8/5
(34)

Network administrators ____ to set up the browsers on the network to use a proxy server.

(Multiple Choice)
5.0/5
(37)

A ____ firewall combines several different security technologies, such as packet filtering, application-level gateways, and VPNs.

(Multiple Choice)
4.8/5
(37)

In a typical transaction, a proxy server intercepts a request from a user on the internal network and passes it along to a destination computer on the Internet.What steps are involved in this process?

(Essay)
4.9/5
(36)

Squid is a full-featured Windows-based firewall that performs access control and filtering and is especially good at quickly serving cached files..

(True/False)
4.8/5
(32)

Match each item with a statement below. -A very popular proxy server for home and small business environments.

(Multiple Choice)
4.7/5
(34)

It is good practice to dedicate a proxy server to one ____________________.

(Short Answer)
4.8/5
(30)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)