Deck 3: Fundamentals of Firewalls
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/27
Play
Full screen (f)
Deck 3: Fundamentals of Firewalls
1
How can vulnerability to flooding attacks be reduced with an application gateway?
A)Authenticating users
B)External systems never see the gateway
C)Packets are continually checked during the connection
D)Vulnerability to flooding attacks with an application gateway cannot be mitigated
A)Authenticating users
B)External systems never see the gateway
C)Packets are continually checked during the connection
D)Vulnerability to flooding attacks with an application gateway cannot be mitigated
A
2
Which type of firewall is included in Windows XP and many distributions of Linux operating systems?
A)Application proxy
B)Packet filter
C)Stateful packet inspection
D)User authentication
A)Application proxy
B)Packet filter
C)Stateful packet inspection
D)User authentication
B
3
At what OSI layer do packet filters function?
A)Physical layer
B)Data link layer
C)Network layer
D)Transport layer
A)Physical layer
B)Data link layer
C)Network layer
D)Transport layer
C
4
Identifying abnormal activity on a firewall requires that one establish a:
A)baseline
B)bastion host
C)proxy server
D)screened host
A)baseline
B)bastion host
C)proxy server
D)screened host
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
5
Which is a term used to refer to the process of authentication and verification?
A)Connecting
B)Filtering
C)Negotiation
D)Screening
A)Connecting
B)Filtering
C)Negotiation
D)Screening
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
6
A term used to refer to the process of authentication and verification as accomplished on some gateways is ____________.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
7
A firewall configuration using a server as a router and running multiple network interfaces with automatic routing disabled is an example of a:
A)dual-homed host
B)network host-based
C)router-based
D)screened host
A)dual-homed host
B)network host-based
C)router-based
D)screened host
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
8
In comparing a packet filter firewall with a stateful packet inspection firewall (SPI),the SPI firewall is:
A)LESS susceptible to ping and SYN floods and LESS susceptible to IP spoofing.
B)LESS susceptible to ping and SYN floods but MORE susceptible to IP spoofing
C)MORE susceptible to ping and SYN floods and LESS susceptible to IP spoofing
D)MORE susceptible to ping and SYN floods and MORE susceptible to IP spoofing
A)LESS susceptible to ping and SYN floods and LESS susceptible to IP spoofing.
B)LESS susceptible to ping and SYN floods but MORE susceptible to IP spoofing
C)MORE susceptible to ping and SYN floods and LESS susceptible to IP spoofing
D)MORE susceptible to ping and SYN floods and MORE susceptible to IP spoofing
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
9
Which type of firewall negotiates between the server and client to permit or deny connection based on the type of software and connection requested?
A)Application gateway
B)Circuit level gateway
C)Packet filter
D)Stateful packet inspection
A)Application gateway
B)Circuit level gateway
C)Packet filter
D)Stateful packet inspection
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
10
Once a circuit level gateway verifies the user's logon,it creates a virtual circuit between:
A)the external server and the proxy server
B)the internal client and the proxy server
C)the internal client and the external server
D)the external server and the firewall
A)the external server and the proxy server
B)the internal client and the proxy server
C)the internal client and the external server
D)the external server and the firewall
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
11
A firewall that uses a combination of approaches rather than a single approach to protect the network is called:
A)dual-homed
B)hybrid
C)multi-homed
D)open source
A)dual-homed
B)hybrid
C)multi-homed
D)open source
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
12
Using a server running the Linux operating system with its built-in firewall as the network firewall is one example of which firewall configuration?
A)dual-homed host
B)network host-based
C)router-based
D)screened host
A)dual-homed host
B)network host-based
C)router-based
D)screened host
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
13
In a ____________ firewall configuration,each incoming packet is examined.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
14
An open source software circuit level gateway is available from which of the following?
A)Amrita Labs
B)SonicWALL
C)Teros
D)Watchguard Technologies
A)Amrita Labs
B)SonicWALL
C)Teros
D)Watchguard Technologies
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
15
Which firewall configuration would be appropriate within a network to separate and protect various subnets of a network to provide greater security?
A)bastion host
B)demilitarized zone
C)dual-homed host
D)router-based
A)bastion host
B)demilitarized zone
C)dual-homed host
D)router-based
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
16
A standalone technology that hides internal addresses from the outside and only allows connections that originate from inside the network is called:
A)DMZ
B)HTTP
C)NAT
D)TFTP
A)DMZ
B)HTTP
C)NAT
D)TFTP
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
17
Which firewall denies or permits access based in part on data determined from previous packets in the conversation?
A)Application gateway
B)Circuit level gateway
C)Packet filter
D)Stateful packet inspection
A)Application gateway
B)Circuit level gateway
C)Packet filter
D)Stateful packet inspection
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
18
In many typical configurations with multiple firewalls,e-mail servers and FTP servers are located in the:
A)corporate Intranet
B)demilitarized zone
C)external network
D)internal corporate network
A)corporate Intranet
B)demilitarized zone
C)external network
D)internal corporate network
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
19
Which type of firewall is generally the simplest and least expensive?
A)Application gateway
B)Circuit level gateway
C)Packet filter
D)Stateful packet inspection
A)Application gateway
B)Circuit level gateway
C)Packet filter
D)Stateful packet inspection
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
20
Which serves as a single contact point between the Internet and the private network?
A)Bastion host
B)DMZ
C)Dual-homed host
D)Screened host
A)Bastion host
B)DMZ
C)Dual-homed host
D)Screened host
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
21
Although very similar to application gateways,_____________ are more secure and usually found on more expensive equipment.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
22
Taking security precautions such as keeping patches updated,uninstalling unneeded applications,closing unused ports,and turning off unused services is called ____________ the operating system.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
23
The stateful packet inspection (SPI)firewall is based on the ____________ firewall.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
24
A ____________ firewall solution is actually a combination of several different firewall systems in a single system.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
25
The first rule of firewalls dictates that to provide the best security,they not only must be installed properly,but they must also be ____________ properly.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
26
With a circuit level gateway in place,external users only see the IP address of the ____________.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
27
Establishing a(n)____________ upon initial setup and configuration of a firewall permits better identification of abnormal traffic versus normal traffic.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck