Deck 3: Fundamentals of Firewalls

ملء الشاشة (f)
exit full mode
سؤال
How can vulnerability to flooding attacks be reduced with an application gateway?

A)Authenticating users
B)External systems never see the gateway
C)Packets are continually checked during the connection
D)Vulnerability to flooding attacks with an application gateway cannot be mitigated
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which type of firewall is included in Windows XP and many distributions of Linux operating systems?

A)Application proxy
B)Packet filter
C)Stateful packet inspection
D)User authentication
سؤال
At what OSI layer do packet filters function?

A)Physical layer
B)Data link layer
C)Network layer
D)Transport layer
سؤال
Identifying abnormal activity on a firewall requires that one establish a:

A)baseline
B)bastion host
C)proxy server
D)screened host
سؤال
Which is a term used to refer to the process of authentication and verification?

A)Connecting
B)Filtering
C)Negotiation
D)Screening
سؤال
A term used to refer to the process of authentication and verification as accomplished on some gateways is ____________.
سؤال
A firewall configuration using a server as a router and running multiple network interfaces with automatic routing disabled is an example of a:

A)dual-homed host
B)network host-based
C)router-based
D)screened host
سؤال
In comparing a packet filter firewall with a stateful packet inspection firewall (SPI),the SPI firewall is:

A)LESS susceptible to ping and SYN floods and LESS susceptible to IP spoofing.
B)LESS susceptible to ping and SYN floods but MORE susceptible to IP spoofing
C)MORE susceptible to ping and SYN floods and LESS susceptible to IP spoofing
D)MORE susceptible to ping and SYN floods and MORE susceptible to IP spoofing
سؤال
Which type of firewall negotiates between the server and client to permit or deny connection based on the type of software and connection requested?

A)Application gateway
B)Circuit level gateway
C)Packet filter
D)Stateful packet inspection
سؤال
Once a circuit level gateway verifies the user's logon,it creates a virtual circuit between:

A)the external server and the proxy server
B)the internal client and the proxy server
C)the internal client and the external server
D)the external server and the firewall
سؤال
A firewall that uses a combination of approaches rather than a single approach to protect the network is called:

A)dual-homed
B)hybrid
C)multi-homed
D)open source
سؤال
Using a server running the Linux operating system with its built-in firewall as the network firewall is one example of which firewall configuration?

A)dual-homed host
B)network host-based
C)router-based
D)screened host
سؤال
In a ____________ firewall configuration,each incoming packet is examined.
سؤال
An open source software circuit level gateway is available from which of the following?

A)Amrita Labs
B)SonicWALL
C)Teros
D)Watchguard Technologies
سؤال
Which firewall configuration would be appropriate within a network to separate and protect various subnets of a network to provide greater security?

A)bastion host
B)demilitarized zone
C)dual-homed host
D)router-based
سؤال
A standalone technology that hides internal addresses from the outside and only allows connections that originate from inside the network is called:

A)DMZ
B)HTTP
C)NAT
D)TFTP
سؤال
Which firewall denies or permits access based in part on data determined from previous packets in the conversation?

A)Application gateway
B)Circuit level gateway
C)Packet filter
D)Stateful packet inspection
سؤال
In many typical configurations with multiple firewalls,e-mail servers and FTP servers are located in the:

A)corporate Intranet
B)demilitarized zone
C)external network
D)internal corporate network
سؤال
Which type of firewall is generally the simplest and least expensive?

A)Application gateway
B)Circuit level gateway
C)Packet filter
D)Stateful packet inspection
سؤال
Which serves as a single contact point between the Internet and the private network?

A)Bastion host
B)DMZ
C)Dual-homed host
D)Screened host
سؤال
Although very similar to application gateways,_____________ are more secure and usually found on more expensive equipment.
سؤال
Taking security precautions such as keeping patches updated,uninstalling unneeded applications,closing unused ports,and turning off unused services is called ____________ the operating system.
سؤال
The stateful packet inspection (SPI)firewall is based on the ____________ firewall.
سؤال
A ____________ firewall solution is actually a combination of several different firewall systems in a single system.
سؤال
The first rule of firewalls dictates that to provide the best security,they not only must be installed properly,but they must also be ____________ properly.
سؤال
With a circuit level gateway in place,external users only see the IP address of the ____________.
سؤال
Establishing a(n)____________ upon initial setup and configuration of a firewall permits better identification of abnormal traffic versus normal traffic.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/27
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Fundamentals of Firewalls
1
How can vulnerability to flooding attacks be reduced with an application gateway?

A)Authenticating users
B)External systems never see the gateway
C)Packets are continually checked during the connection
D)Vulnerability to flooding attacks with an application gateway cannot be mitigated
A
2
Which type of firewall is included in Windows XP and many distributions of Linux operating systems?

A)Application proxy
B)Packet filter
C)Stateful packet inspection
D)User authentication
B
3
At what OSI layer do packet filters function?

A)Physical layer
B)Data link layer
C)Network layer
D)Transport layer
C
4
Identifying abnormal activity on a firewall requires that one establish a:

A)baseline
B)bastion host
C)proxy server
D)screened host
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which is a term used to refer to the process of authentication and verification?

A)Connecting
B)Filtering
C)Negotiation
D)Screening
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
6
A term used to refer to the process of authentication and verification as accomplished on some gateways is ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
7
A firewall configuration using a server as a router and running multiple network interfaces with automatic routing disabled is an example of a:

A)dual-homed host
B)network host-based
C)router-based
D)screened host
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
8
In comparing a packet filter firewall with a stateful packet inspection firewall (SPI),the SPI firewall is:

A)LESS susceptible to ping and SYN floods and LESS susceptible to IP spoofing.
B)LESS susceptible to ping and SYN floods but MORE susceptible to IP spoofing
C)MORE susceptible to ping and SYN floods and LESS susceptible to IP spoofing
D)MORE susceptible to ping and SYN floods and MORE susceptible to IP spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which type of firewall negotiates between the server and client to permit or deny connection based on the type of software and connection requested?

A)Application gateway
B)Circuit level gateway
C)Packet filter
D)Stateful packet inspection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
10
Once a circuit level gateway verifies the user's logon,it creates a virtual circuit between:

A)the external server and the proxy server
B)the internal client and the proxy server
C)the internal client and the external server
D)the external server and the firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
11
A firewall that uses a combination of approaches rather than a single approach to protect the network is called:

A)dual-homed
B)hybrid
C)multi-homed
D)open source
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
12
Using a server running the Linux operating system with its built-in firewall as the network firewall is one example of which firewall configuration?

A)dual-homed host
B)network host-based
C)router-based
D)screened host
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
13
In a ____________ firewall configuration,each incoming packet is examined.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
14
An open source software circuit level gateway is available from which of the following?

A)Amrita Labs
B)SonicWALL
C)Teros
D)Watchguard Technologies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which firewall configuration would be appropriate within a network to separate and protect various subnets of a network to provide greater security?

A)bastion host
B)demilitarized zone
C)dual-homed host
D)router-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
16
A standalone technology that hides internal addresses from the outside and only allows connections that originate from inside the network is called:

A)DMZ
B)HTTP
C)NAT
D)TFTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which firewall denies or permits access based in part on data determined from previous packets in the conversation?

A)Application gateway
B)Circuit level gateway
C)Packet filter
D)Stateful packet inspection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
18
In many typical configurations with multiple firewalls,e-mail servers and FTP servers are located in the:

A)corporate Intranet
B)demilitarized zone
C)external network
D)internal corporate network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which type of firewall is generally the simplest and least expensive?

A)Application gateway
B)Circuit level gateway
C)Packet filter
D)Stateful packet inspection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which serves as a single contact point between the Internet and the private network?

A)Bastion host
B)DMZ
C)Dual-homed host
D)Screened host
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
21
Although very similar to application gateways,_____________ are more secure and usually found on more expensive equipment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
22
Taking security precautions such as keeping patches updated,uninstalling unneeded applications,closing unused ports,and turning off unused services is called ____________ the operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
23
The stateful packet inspection (SPI)firewall is based on the ____________ firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
24
A ____________ firewall solution is actually a combination of several different firewall systems in a single system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
25
The first rule of firewalls dictates that to provide the best security,they not only must be installed properly,but they must also be ____________ properly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
26
With a circuit level gateway in place,external users only see the IP address of the ____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
27
Establishing a(n)____________ upon initial setup and configuration of a firewall permits better identification of abnormal traffic versus normal traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.