Deck 9: Firewalls
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 9: Firewalls
1
Generally,connections to instant-messaging ports are harmless and should be allowed.
False
2
Which of the following is NOT among the common guidelines that should be reflected in the rule base to implement an organization's security policy?
A) only authenticated traffic can access the internal network
B) employees can use instant-messaging only with external network users
C) the public can access the company Web servers
D) employees can have restricted Internet access
A) only authenticated traffic can access the internal network
B) employees can use instant-messaging only with external network users
C) the public can access the company Web servers
D) employees can have restricted Internet access
B
3
The Cisco PIX line of products is best described as which of the following?
A) software firewall
B) PC with firewall installed
C) firewall appliance
D) VPN gateway
A) software firewall
B) PC with firewall installed
C) firewall appliance
D) VPN gateway
C
4
Which two ports should packet-filtering rules address when establishing rules for Web access?
A) 143, 80
B) 25, 110
C) 80, 443
D) 423, 88
A) 143, 80
B) 25, 110
C) 80, 443
D) 423, 88
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
What type of attack are stateless packet filters particularly vulnerable to?
A) attempts to connect to ports above 1023
B) attempts to connect to the firewall
C) IP spoofing attacks
D) attempts to connect to ports below 1023
A) attempts to connect to ports above 1023
B) attempts to connect to the firewall
C) IP spoofing attacks
D) attempts to connect to ports below 1023
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is a general practice for a rule base?
A) begin by blocking all traffic and end by allowing selective services
B) permit access to public servers in the DMZ
C) allow all access to the firewall
D) allow direct access from the Internet to computers behind the firewall
A) begin by blocking all traffic and end by allowing selective services
B) permit access to public servers in the DMZ
C) allow all access to the firewall
D) allow direct access from the Internet to computers behind the firewall
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What is considered the 'cleanup rule' on a Cisco router?
A) explicit allow all
B) implicit deny all
C) explicit prompt
D) implicit allow
A) explicit allow all
B) implicit deny all
C) explicit prompt
D) implicit allow
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is NOT a criteria typically used by stateless packet filters to determine whether or not to block packets.
A) IP address
B) ports
C) data patterns
D) TCP flags
A) IP address
B) ports
C) data patterns
D) TCP flags
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is NOT a protocol,port pair that should be filtered when an attempt is made to make a connection from outside the company network?
A) TCP,80
B) TCP,139
C) UDP,138
D) TCP,3389
A) TCP,80
B) TCP,139
C) UDP,138
D) TCP,3389
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is a typical drawback of a free firewall program?
A) cannot monitor traffic in real time
B) oversimplified configuration
C) have centralized management
D) more expensive than hardware firewalls
A) cannot monitor traffic in real time
B) oversimplified configuration
C) have centralized management
D) more expensive than hardware firewalls
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
At what layer of the OSI model do proxy servers generally operate?
A) Application
B) Session
C) Transport
D) Network
A) Application
B) Session
C) Transport
D) Network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Stateless packet filtering keeps a record of connections that a host computer has made with other computers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which element of a rule base conceals internal names and IP addresses from users outside the network?
A) tracking
B) filtering
C) NAT
D) QoS
A) tracking
B) filtering
C) NAT
D) QoS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Since ICMP messages use authentication,man-in-the-middle attacks cannot be successful.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is described as the combination of an IP address and a port number?
A) portal
B) subnet
C) datagram
D) socket
A) portal
B) subnet
C) datagram
D) socket
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
What is a suggested maximum size of a rule base?
A) 30 rules
B) 300 rules
C) 10 rules
D) 100 rules
A) 30 rules
B) 300 rules
C) 10 rules
D) 100 rules
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
What should a company concerned about protecting its data warehouses and employee privacy might consider installing on the network perimeter to prevent direct connections between the internal network and the Internet?
A) router
B) VPN server
C) ICMP monitor
D) proxy server
A) router
B) VPN server
C) ICMP monitor
D) proxy server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Firewalls can protect against employees copying confidential data from within the network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Software firewalls are usually more scalable than hardware firewalls.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is an advantage of hardware firewalls?
A) not scalable compared to software firewalls
B) not dependent on a conventional OS
C) less expensive than software firewalls
D) easy to patch
A) not scalable compared to software firewalls
B) not dependent on a conventional OS
C) less expensive than software firewalls
D) easy to patch
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
A firewall can consist of all devices positioned on the network _____________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
MATCHING
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
the end point of a computer-to-computer connection defined by an IP address and port address
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
the end point of a computer-to-computer connection defined by an IP address and port address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
the collection of rules that filter traffic at an interface of a firewall
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
the collection of rules that filter traffic at an interface of a firewall
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
What type of ICMP packet can an attacker use to send traffic to a computer they control outside the protected network?
A) Source Quench
B) Echo Request
C) Destination Unreachable
D) Redirect
A) Source Quench
B) Echo Request
C) Destination Unreachable
D) Redirect
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is NOT an ICMPv6 packet type that you should allow within your organization but never outside the organization?
A) Destination unreachable
B) Packet too big
C) Time Exceeded
D) Packet Redirect
A) Destination unreachable
B) Packet too big
C) Time Exceeded
D) Packet Redirect
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
software that forwards network packets and caches Web pages to speed up network performance
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
software that forwards network packets and caches Web pages to speed up network performance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
a packet-filtering rule that comes last in a rule base and covers any packets that have not been covered by preceding rules
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
a packet-filtering rule that comes last in a rule base and covers any packets that have not been covered by preceding rules
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
MATCHING
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
a file maintained by stateful packet filters that contains a record of all current connections
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
a file maintained by stateful packet filters that contains a record of all current connections
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
MATCHING
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
hardware or software configured to block unauthorized access to a network
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
hardware or software configured to block unauthorized access to a network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
MATCHING
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
simple filters that determine whether to allow or block packets based on information in protocol headers
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
simple filters that determine whether to allow or block packets based on information in protocol headers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
The ACK flag is normally sent at the end of the three-way ______________ to indicate that a connection is established.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What service uses UDP port 53?
A) SMTP
B) DNS
C) ICMP
D) TFTP
A) SMTP
B) DNS
C) ICMP
D) TFTP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
MATCHING
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
filters that are similar to stateless packet filters,except that they also determine whether to allow or block packets based on information about current connections
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
filters that are similar to stateless packet filters,except that they also determine whether to allow or block packets based on information about current connections
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
What are the two standard ports used by FTP along with their function?
A) UDP 23 control, TCP 20 data
B) UDP 20 data, TCP 21 control
C) TCP 21 control, TCP 20 data
D) TCP 23 data, TCP 21 control
A) UDP 23 control, TCP 20 data
B) UDP 20 data, TCP 21 control
C) TCP 21 control, TCP 20 data
D) TCP 23 data, TCP 21 control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
MATCHING
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
an addition to a security policy that describes how firewalls should handle application traffic,such as Web or e-mail applications
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
an addition to a security policy that describes how firewalls should handle application traffic,such as Web or e-mail applications
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
MATCHING
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
hardware devices with firewall functionality
a.cleanup rule
b.firewall
c.firewall appliance
d.firewall policy
e.proxy server
f.rule base
g.socket
h.state table
i.stateful packet filters
j.stateless packet filters
hardware devices with firewall functionality
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is a method for supporting IPv6 on IPv4 networks until IPv6 is universally adopted?
A) Teredo tunneling
B) ICMPv6 encapsulation
C) IPsec tunneling
D) SMTP/S tunneling
A) Teredo tunneling
B) ICMPv6 encapsulation
C) IPsec tunneling
D) SMTP/S tunneling
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
ACLs filter packets by using a __________ base to determine whether to allow a packet to pass.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
The rule base should permit access to public servers in the _________ and enable users to access the Internet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
A primary objective of a rule base is to ______________ communications based on complex rules.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What makes an effective rule base? List three points to consider.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is a cleanup rule? Provide an example.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What are the most common features of IP protocol headers that stateless packet filters base their filtering decisions on?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Describe a packet-filtering scenario that works with the DMZ.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What happens when a packet hits a firewall? Discuss the possible actions that are taken.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe a firewall policy for application traffic.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Discuss what a firewall is and its role in a company's overall security scheme.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Describe a hardware firewall and include one or more advantages and disadvantages.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is stateful packet filtering?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Describe a software firewall and include one or more advantages and disadvantages.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck