Filters
Question type

Study Flashcards

Which is a term used to refer to the process of authentication and verification?


A) Connecting
B) Filtering
C) Negotiation
D) Screening

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Which firewall configuration would be appropriate within a network to separate and protect various subnets of a network to provide greater security?


A) bastion host
B) demilitarized zone
C) dual-homed host
D) router-based

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Identifying abnormal activity on a firewall requires that one establish a:


A) baseline
B) bastion host
C) proxy server
D) screened host

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

In comparing a packet filter firewall with a stateful packet inspection firewall (SPI) ,the SPI firewall is:


A) LESS susceptible to ping and SYN floods and LESS susceptible to IP spoofing.
B) LESS susceptible to ping and SYN floods but MORE susceptible to IP spoofing
C) MORE susceptible to ping and SYN floods and LESS susceptible to IP spoofing
D) MORE susceptible to ping and SYN floods and MORE susceptible to IP spoofing

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

An open source software circuit level gateway is available from which of the following?


A) Amrita Labs
B) SonicWALL
C) Teros
D) Watchguard Technologies

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

A ____________ firewall solution is actually a combination of several different firewall systems in a single system.

Correct Answer

verifed

verified

hybrid

A firewall that uses a combination of approaches rather than a single approach to protect the network is called:


A) dual-homed
B) hybrid
C) multi-homed
D) open source

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

B

Taking security precautions such as keeping patches updated,uninstalling unneeded applications,closing unused ports,and turning off unused services is called ____________ the operating system.

Correct Answer

verifed

verified

A firewall configuration using a server as a router and running multiple network interfaces with automatic routing disabled is an example of a:


A) dual-homed host
B) network host-based
C) router-based
D) screened host

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

How can vulnerability to flooding attacks be reduced with an application gateway?


A) Authenticating users
B) External systems never see the gateway
C) Packets are continually checked during the connection
D) Vulnerability to flooding attacks with an application gateway cannot be mitigated

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Once a circuit level gateway verifies the user's logon,it creates a virtual circuit between:


A) the external server and the proxy server
B) the internal client and the proxy server
C) the internal client and the external server
D) the external server and the firewall

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

B

Which type of firewall is included in Windows XP and many distributions of Linux operating systems?


A) Application proxy
B) Packet filter
C) Stateful packet inspection
D) User authentication

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

The first rule of firewalls dictates that to provide the best security,they not only must be installed properly,but they must also be ____________ properly.

Correct Answer

verifed

verified

With a circuit level gateway in place,external users only see the IP address of the ____________.

Correct Answer

verifed

verified

At what OSI layer do packet filters function?


A) Physical layer
B) Data link layer
C) Network layer
D) Transport layer

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

A term used to refer to the process of authentication and verification as accomplished on some gateways is ____________.

Correct Answer

verifed

verified

Which serves as a single contact point between the Internet and the private network?


A) Bastion host
B) DMZ
C) Dual-homed host
D) Screened host

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Which firewall denies or permits access based in part on data determined from previous packets in the conversation?


A) Application gateway
B) Circuit level gateway
C) Packet filter
D) Stateful packet inspection

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

In many typical configurations with multiple firewalls,e-mail servers and FTP servers are located in the:


A) corporate Intranet
B) demilitarized zone
C) external network
D) internal corporate network

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Which type of firewall negotiates between the server and client to permit or deny connection based on the type of software and connection requested?


A) Application gateway
B) Circuit level gateway
C) Packet filter
D) Stateful packet inspection

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 27

Related Exams

Show Answer