Deck 12: Firewalls
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 12: Firewalls
1
One advantage of a packet filtering firewall is its simplicity.
True
2
Packet filters tend to be more secure than application level gateways.
False
3
A _________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.
A)host-based
B)packet filtering
C)distributed
D)stateful inspection
A)host-based
B)packet filtering
C)distributed
D)stateful inspection
B
4
The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
A firewall may not act as a packet filter.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
_________ can be an effective means of protecting a local system or network of systems from network based security threats while at the same time affording access to the outside world via wide area networks and the Internet.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
The firewall cannot fully protect against internal threats.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Firewall functionality can also be implemented as a software module in a router or LAN switch.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
A circuit level proxy can be a stand alone system or it can be a specialized function performed by an application level gateway for certain applications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The _________ is the transport level port number which defines applications such as SNMP or TELNET.
A)Source IP address
B)IP protocol field
C)Source and destination transport level address
D)Interface
A)Source IP address
B)IP protocol field
C)Source and destination transport level address
D)Interface
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
The _________ is the address of the system that originated the IP packet.
A)Interface
B)Source and destination transport level address
C)IP protocol field
D)Source IP address
A)Interface
B)Source and destination transport level address
C)IP protocol field
D)Source IP address
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
A stateful packet inspection firewall reviews the same packet information as a packet filtering firewall but also records information about TCP connections.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
A firewall may be designed to operate as a filter at the level of IP packets or may operate at a higher protocol layer.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
An example of application level gateway implementation is the SOCKS package.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
Packet filter firewalls examine upper layer data therefore they can prevent attacks that employ application specific vulnerabilities or functions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The technique that controls how particular services are used is the _________ control.The firewall may filter e-mail to eliminate spam, or it may enable external access to only a portion of the information on a local Web server.
A)direction
B)user
C)behavior
D)service
A)direction
B)user
C)behavior
D)service
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
The external firewall adds more stringent filtering capability in order to protect enterprise servers and workstations from external attack.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Due to the small number of variables used in access control decisions packet filter firewalls are susceptible to security breaches caused by improper configurations.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
The direction control determines the types of Internet services that can be accessed, inbound or outbound.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The primary role of the personal firewall is to deny unauthorized remote access to the computer.
A)VPNs
B)Proxys
C)Firewalls
D)SOCKS
A)VPNs
B)Proxys
C)Firewalls
D)SOCKS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A _________ sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host.Once the two connections are established TCP segments from one connection are relayed to the other without examining the contents.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
A _________ packet firewall tightens up the rules for TCP traffic by creating a directory of outbound TCP connections.There is an entry for each currently established connection and the packet filter will now allow incoming traffic to high numbered ports only for those packets that fit the profile of one of the entries in this directory.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
Four types of firewalls are: Packet filtering, stateful inspection, circuit level proxy and _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
________ has a third network interface on bastion to a DMZ where externally visible servers are placed.This is a common appliance configuration for medium to large organizations.
A)double bastion inline
B)double bastion T
C)single bastion inline
D)single bastion T
A)double bastion inline
B)double bastion T
C)single bastion inline
D)single bastion T
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
A typical use of a _________ is a situation in which the system administrator trusts the internal users.
A)packet filtering firewall
B)circuit level gateway
C)application level gateway
D)stateful inspection firewall
A)packet filtering firewall
B)circuit level gateway
C)application level gateway
D)stateful inspection firewall
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
A _________ forms a barrier through which the traffic going in each direction must pass and dictates which traffic is authorized to pass.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
The __________ defines the transport protocol.
A)source IP address
B)destination IP address
C)interface
D)IP protocol field
A)source IP address
B)destination IP address
C)interface
D)IP protocol field
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
The _________ attack is designed to circumvent filtering rules that depend on TCP header information.
A)source routing
B)IP address spoofing
C)network layer address spoofing
D)tiny fragment
A)source routing
B)IP address spoofing
C)network layer address spoofing
D)tiny fragment
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The iTunes Music Sharing inbound service is port number ________ .
A)5297
B)3031
C)3869
D)5298
A)5297
B)3031
C)3869
D)5298
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
A __________ attack is where the source station specifies the route that a packet should take as it crosses the Internet in the hopes that this will bypass security measures that do not analyze the source routing information.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
Common for large businesses and government organizations, the _________ configuration sandwiches the DMZ between bastion firewalls.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
A ________ is a single router between internal and external networks with stateless or full packet filtering.This arrangement is typical for SOHO applications.
A)DMZ
B)screening router
C)single bastion T
D)host resident firewall
A)DMZ
B)screening router
C)single bastion T
D)host resident firewall
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
Common for large businesses and government organizations, the ________ configuration is required for Australian government use.
A)Double bastion inline
B)Double bastion T
C)Single bastion inline
D)Single bastion T
A)Double bastion inline
B)Double bastion T
C)Single bastion inline
D)Single bastion T
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
An important aspect of a distributed firewall configuration is _________ .
A)change control
B)network frame locking
C)security monitoring
D)configuration alerting
A)change control
B)network frame locking
C)security monitoring
D)configuration alerting
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
A _________ firewall configuration involves stand alone firewall devices plus host based firewalls working together under a central administrative control.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
The four general techniques that firewalls use to control access and enforce the site's security policy are: service control, direction control, user control, and __________ control.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The default _________ policy increases ease of use for end users but provides reduced security because the security administrator must, in essence, react to each new security threat as it becomes known.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
Typically serving as a platform for an application level or circuit level gateway, a ________ is a system identified by the firewall administrator as a critical strong point in the network's security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
Available in many operating systems or provided as an add on package, a ________ is a software module used to secure an individual host and also filters and restricts the flow of packets.
A)application level gateway
B)circuit level gateway
C)host based firewall
D)DMZ
A)application level gateway
B)circuit level gateway
C)host based firewall
D)DMZ
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
SOCKS is defined in _________ as "a framework for client server applications in both the TCP and UDP domains to conveniently and securely use the services of a network firewall".
A)RFC 1935
B)RFC 1928
C)RFC 1046
D)RFC 1024
A)RFC 1935
B)RFC 1928
C)RFC 1046
D)RFC 1024
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
Between an internal firewall and an external firewall are one or more networked devices in a region referred to as a _________ .Systems that are externally accessible but need some protection are usually located in this area.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A ________ is a single firewall device between an internal and external router.The firewall may implement stateful filters and/or application proxies.This is the typical firewall appliance configuration for small to medium sized organizations.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
_________ firewalls include personal firewall software and firewall software on servers.Such firewalls can be used alone or as part of an in-depth firewall deployment.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
A _________ consists of a set of computers that interconnect by means of a relatively unsecure network and that make use of encryption and special protocols to provide security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
A ________ firewall controls the traffic between a personal computer or workstation on one side and the Internet or enterprise network on the other side.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck