Deck 4: Introduction to Firewalls

Full screen (f)
exit full mode
Question
The combination of a sender's full address (network address plus port) and receiver's address (network address plus port) makes up a ____.

A) socket
B) packet
C) bastion
D) DMZ
Use Space or
up arrow
down arrow
to flip the card.
Question
A packet-filtering firewall installed on a TCP/IP-based network typically functions at the TCP level.
Question
A properly configured firewall only allows authorized connection attempts to the ports on the network it protects.
Question
Ports numbers range from 0 to ____.

A) 1024
B) 3999
C) 65,535
D) 786,568
Question
Firewalls provide ____ services by examining packet headers and allowing traffic that conforms to estalished rules to continue.

A) packet filtering
B) NAT
C) application proxy
D) TCP/IP
Question
A firewall is designed to prevent all attackers, viruses, and would-be intruders from entering a computer or computer network.
Question
Firewalls can be used to host ____ to reduce server load and improve Web-site performance.

A) logging
B) shielding hosts
C) VPN
D) cached data
Question
A ____ contains the source's IP and port as well as the destination's IP and port, and it also provides information on the total time in seconds, the time remaining in seconds, and the protocol used (UDP or TCP).

A) state table
B) packet header
C) datagram
D) TCP table
Question
____ are commonly used to connect two companies networks over the Internet in a site-to-site configuration.

A) Bastion hosts
B) VPNs
C) Proxy servers
D) Stateful proxies
Question
Application-layer gateways can control the way applications inside the network access external networks by setting up proxy services.
Question
A network that needs to connect to the Internet might have a ____ host and a service network.

A) walled
B) mail
C) packet
D) bastion
Question
Application gateways function at the ____ layer of the OSI model.

A) presentation
B) transport
C) network
D) data link
Question
A firewall may also help prevent some Trojan horses from leveraging the local network through unauthorized service ports called ____.

A) back doors
B) application proxies
C) perimeters
D) content locks
Question
____ breaks a message into numbered segments so that it can be transmitted.It then reassembles the message when it reaches the destination computer.

A) TCP/IP
B) UDP
C) IP filtering
D) TCP filtering
Question
Mobile devices such as laptops, PDAs, and smartphones blur the perimeter boundary.
Question
A ____ firewall enables you to log passing traffic, protecting the whole network at one time.

A) stateful
B) stateless
C) perimeter
D) DMZ
Question
A firewall can act as a(n) ____ server that makes high-level application connections on behalf of internal hosts and other machines.

A) proxy
B) forward
C) HTTP
D) outbound
Question
Packet-filtering firewalls examine every incoming packet _____ and can selectively filter packets.

A) transport
B) session
C) header
D) data
Question
In the OSI model, level 1 is the ____ layer.

A) physical
B) data link
C) transport
D) application
Question
Network perimeters may be blurred by ____.

A) VPNs
B) intranets
C) Web sites
D) desktop computers
Question
Third-generation, stateful inspection firewalls monitor network connections between internal and external systems using ____.

A) rules sets
B) stateless protocols
C) state tables
D) SQL databases
Question
What are some of the advanced security functions provided by modern firewalls?
Question
A(n) ____________________ is an extended network that shares part of an organization's network with third parties.
Question
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Providing network services to users while shielding individual host computers.
Question
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Machine that has no unnecessary services, only the bare essentials.
Question
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Function as an outbound network-level proxy.
Question
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Information you view and use.
Question
____________________ inspection blocks packets that are sent from an external computer that does not have a currently active connection to an internal computer.
Question
"____________________" refers to the era of technology a firewall evolved in.
Question
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Consists of general information about the size of the packet, the protocol that was used to send it, and the IP address of both the source computer and the destination
Question
____ firewalls can be used to perform load balancing.

A) Application gateway
B) Stateful
C) Stateless
D) NAT
Question
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Network subaddress through which a particular type of data is allowed to pass.
Question
To someone on the Internet or another outside network, it appears that all information is coming from a single computer when ____ is used.

A) PAT
B) NAT
C) VPN
D) IETF
Question
Port numbers come in two flavors: well-known ports and ____________________ ports.
Question
Most firewalls fall into the ____ category.

A) application gateway
B) packet-filter
C) MAC layer
D) hybrid
Question
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Determining whether to allow or deny the passage of packets of digital information, based on established security policy rules.
Question
The OSI networking model has ____________________ layers.
Question
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Boundary between two zones of trust.
Question
When the ____ architectural approach is used, the bastion host contains two NICs (network interface cards) rather than one, as in the bastion host configuration.

A) screened subnet
B) screened host
C) packet-filtering router\
D) dual-homed host
Question
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Segment of the DMZ where additional authentication and authorization controls are put into place to provide services that are not available to the general public.
Question
What components are commonly found in a firewall?
Question
Describe the differences between software and hardware firewalls.
Question
What is User Datagram Protocol (UDP)?
Question
How do firewalls help document what happens on a network?
Question
Describe stateless packet-filtering firewalls.
Question
What is a MAC layer firewall?
Question
Provide an example of a proxy server implementation.
Question
What type of packet-filtering rules are typically defined?
Question
Describe each generation of firewalls.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/49
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Introduction to Firewalls
1
The combination of a sender's full address (network address plus port) and receiver's address (network address plus port) makes up a ____.

A) socket
B) packet
C) bastion
D) DMZ
A
2
A packet-filtering firewall installed on a TCP/IP-based network typically functions at the TCP level.
False
3
A properly configured firewall only allows authorized connection attempts to the ports on the network it protects.
True
4
Ports numbers range from 0 to ____.

A) 1024
B) 3999
C) 65,535
D) 786,568
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
5
Firewalls provide ____ services by examining packet headers and allowing traffic that conforms to estalished rules to continue.

A) packet filtering
B) NAT
C) application proxy
D) TCP/IP
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
6
A firewall is designed to prevent all attackers, viruses, and would-be intruders from entering a computer or computer network.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
7
Firewalls can be used to host ____ to reduce server load and improve Web-site performance.

A) logging
B) shielding hosts
C) VPN
D) cached data
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
8
A ____ contains the source's IP and port as well as the destination's IP and port, and it also provides information on the total time in seconds, the time remaining in seconds, and the protocol used (UDP or TCP).

A) state table
B) packet header
C) datagram
D) TCP table
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
9
____ are commonly used to connect two companies networks over the Internet in a site-to-site configuration.

A) Bastion hosts
B) VPNs
C) Proxy servers
D) Stateful proxies
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
10
Application-layer gateways can control the way applications inside the network access external networks by setting up proxy services.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
11
A network that needs to connect to the Internet might have a ____ host and a service network.

A) walled
B) mail
C) packet
D) bastion
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
12
Application gateways function at the ____ layer of the OSI model.

A) presentation
B) transport
C) network
D) data link
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
13
A firewall may also help prevent some Trojan horses from leveraging the local network through unauthorized service ports called ____.

A) back doors
B) application proxies
C) perimeters
D) content locks
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
14
____ breaks a message into numbered segments so that it can be transmitted.It then reassembles the message when it reaches the destination computer.

A) TCP/IP
B) UDP
C) IP filtering
D) TCP filtering
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
15
Mobile devices such as laptops, PDAs, and smartphones blur the perimeter boundary.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
16
A ____ firewall enables you to log passing traffic, protecting the whole network at one time.

A) stateful
B) stateless
C) perimeter
D) DMZ
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
17
A firewall can act as a(n) ____ server that makes high-level application connections on behalf of internal hosts and other machines.

A) proxy
B) forward
C) HTTP
D) outbound
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
18
Packet-filtering firewalls examine every incoming packet _____ and can selectively filter packets.

A) transport
B) session
C) header
D) data
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
19
In the OSI model, level 1 is the ____ layer.

A) physical
B) data link
C) transport
D) application
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
20
Network perimeters may be blurred by ____.

A) VPNs
B) intranets
C) Web sites
D) desktop computers
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
21
Third-generation, stateful inspection firewalls monitor network connections between internal and external systems using ____.

A) rules sets
B) stateless protocols
C) state tables
D) SQL databases
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
22
What are some of the advanced security functions provided by modern firewalls?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) ____________________ is an extended network that shares part of an organization's network with third parties.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
24
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Providing network services to users while shielding individual host computers.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
25
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Machine that has no unnecessary services, only the bare essentials.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
26
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Function as an outbound network-level proxy.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
27
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Information you view and use.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
28
____________________ inspection blocks packets that are sent from an external computer that does not have a currently active connection to an internal computer.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
29
"____________________" refers to the era of technology a firewall evolved in.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
30
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Consists of general information about the size of the packet, the protocol that was used to send it, and the IP address of both the source computer and the destination
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
31
____ firewalls can be used to perform load balancing.

A) Application gateway
B) Stateful
C) Stateless
D) NAT
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
32
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Network subaddress through which a particular type of data is allowed to pass.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
33
To someone on the Internet or another outside network, it appears that all information is coming from a single computer when ____ is used.

A) PAT
B) NAT
C) VPN
D) IETF
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
34
Port numbers come in two flavors: well-known ports and ____________________ ports.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
35
Most firewalls fall into the ____ category.

A) application gateway
B) packet-filter
C) MAC layer
D) hybrid
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
36
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Determining whether to allow or deny the passage of packets of digital information, based on established security policy rules.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
37
The OSI networking model has ____________________ layers.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
38
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Boundary between two zones of trust.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
39
When the ____ architectural approach is used, the bastion host contains two NICs (network interface cards) rather than one, as in the bastion host configuration.

A) screened subnet
B) screened host
C) packet-filtering router\
D) dual-homed host
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
40
Match each item with a statement below.
a.PAT and NAT
b.bastion host
c.application proxy
d.extranet
e.header
f.perimeter
g.data
h.port
i.packet filtering
Segment of the DMZ where additional authentication and authorization controls are put into place to provide services that are not available to the general public.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
41
What components are commonly found in a firewall?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
42
Describe the differences between software and hardware firewalls.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
43
What is User Datagram Protocol (UDP)?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
44
How do firewalls help document what happens on a network?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
45
Describe stateless packet-filtering firewalls.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
46
What is a MAC layer firewall?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
47
Provide an example of a proxy server implementation.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
48
What type of packet-filtering rules are typically defined?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
49
Describe each generation of firewalls.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 49 flashcards in this deck.