Deck 10: Firewall Design and Management

ملء الشاشة (f)
exit full mode
سؤال
Which type of security device can speed up Web page retrieval and shield hosts on the internal network?

A) caching firewall
B) proxy server
C) caching-only DNS server
D) DMZ intermediary
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What is a step you can take to harden a bastion host?

A) enable additional services to serve as honeypots
B) open several ports to confuse attackers
C) configure several extra accounts with complex passwords
D) remove unnecessary services
سؤال
Proxy servers take action based only on IP header information.
سؤال
Which of the following is true about a screening router?

A) it examines the data in the packet to make filtering decisions
B) it can stop attacks from spoofed addresses
C) it maintains a state table to determine connection information
D) it should be combined with a firewall for better security
سؤال
In what type of attack are zombies usually put to use?

A) buffer overrun
B) virus
C) DDoS
D) spoofing
سؤال
What do you call a firewall that is connected to the Internet,the internal network,and the DMZ?

A) multi-homed proxy
B) three-pronged firewall
C) three-way packet filter
D) multi-zone host
سؤال
A screened host has a router as part of the configuration.
سؤال
Which of the following is a disadvantage of using a proxy server?

A) shields internal host IP addresses
B) slows Web page access
C) may require client configuration
D) can't filter based on packet content
سؤال
What should you consider installing if you want to inspect packets as they leave the network?

A) security workstation
B) RIP router
C) filtering proxy
D) reverse firewall
سؤال
Which of the following best describes a bastion host?

A) a host with two or more network interfaces
B) a computer on the perimeter network that is highly protected
C) a computer running a standard OS that also has proxy software installed
D) a computer running only embedded firmware
سؤال
Which type of firewall configuration protects public servers by isolating them from the internal network?

A) screened subnet DMZ
B) dual-homed host
C) screening router
D) reverse firewall
سؤال
Which network device works at the Application layer by reconstructing packets and forwarding them to Web servers?

A) Layer 7 switch
B) translating gateway
C) proxy server
D) ICMP redirector
سؤال
Which of the following best describes a DMZ?

A) a network of computers configured with robust firewall software
B) a subnet of publicly accessible servers placed outside the internal network
C) a private subnet that is inaccessible to both the Internet and the company network
D) a proxy server farm used to protect the identity of internal servers
سؤال
A dual-homed host has a single NIC with two MAC addresses.
سؤال
Which of the following is true about a dual-homed host?

A) serves as a single point of entry to the network
B) its main objective is to stop worms and viruses
C) uses a single NIC to manage two network connections
D) it is used as a remote access server in some configurations
سؤال
The TCP normalization feature forwards abnormal packets to an administrator for further inspection.
سؤال
Where should network management systems generally be placed?

A) out of band
B) in the DMZ
C) on the perimeter
D) in the server farm
سؤال
Reverse firewalls allow all incoming traffic except what the ACLs are configured to deny.
سؤال
Which of the following is best described as software that prioritizes and schedules requests and then distributes them to servers based on each server's current load and processing power.

A) server pooling software
B) traffic distribution filter
C) priority server farm
D) load-balancing software
سؤال
What is a critical step you should take on the OS you choose for a bastion host?

A) ensure all security patches are installed
B) make sure it is the latest OS version
C) choose an obscure OS with which attackers are unfamiliar
D) customize the OS for bastion operation
سؤال
In a screened ____________ setup,a router is added between the host and the Internet to carry out IP packet filtering.
سؤال
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
a process that uses the source and destination TCP and UDP port addresses to map traffic between internal and external hosts
سؤال
What is the term used for a computer placed on the network perimeter that is meant to attract attackers?

A) bastion host
B) honeypot
C) proxy decoy
D) virtual server
سؤال
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
a group of servers connected in a subnet that work together to receive requests
سؤال
Which type of translation should you use if you need 50 computers in the corporate network to be able to access the Internet using a single public IP address?

A) one-to-one NAT
B) port address translation
C) one-to-many NAT
D) DMZ proxy translation
سؤال
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
a router placed between an untrusted network and an internal network
سؤال
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
software that prioritizes and schedules requests and then distributes them to servers in a server cluster based on each server's current load and processing power
سؤال
Which type of NAT is typically used on devices in the DMZ?

A) one-to-one NAT
B) port address translation
C) one-to-many NAT
D) many-to-one NAT
سؤال
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
a firewall with separate interfaces connected to an untrusted network,a semitrusted network,and a trusted network
سؤال
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
software that forwards packets to and from the network being protected and caches Web pages to speed up network performance
سؤال
A _______________ router determines whether to allow or deny packets based on their source and destination IP addresses.
سؤال
A primary goal of proxy servers is to provide security at the _______________ layer.
سؤال
Why is a bastion host the system most likely to be attacked?

A) it has weak security
B) it contains company documents
C) it is available to external users
D) it contains the default administrator account
سؤال
You can ______________ a bastion host by removing unnecessary accounts and services.
سؤال
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
a host in which one interface is connected to an internal network and the other interface is connected to a router to an untrusted network
سؤال
A DMZ is a subnet of _____________ accessible servers placed outside the internal network.
سؤال
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
a device that filters outgoing connections
سؤال
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
the process of mapping one internal IP address to one external IP address
سؤال
Which of the following is true about private IP addresses?

A) they are assigned by the IANA
B) they are not routable on the Internet
C) they are targeted by attackers
D) NAT was designed to conserve them
سؤال
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
a computer configured with more than one network interface
سؤال
What are the 8 general steps for creating a bastion host?
سؤال
What is a honeypot and how is one used to help protect the network?
سؤال
Describe the setup in which a dual-homed host is used.What are the limitations of this configuration?
سؤال
How does a screened host setup differ from a dual-homed host configuration? Why might you choose this configuration?
سؤال
What are the primary and secondary goals of modern proxy servers?
سؤال
What is a bastion host and how is one typically configured?
سؤال
Describe the process of network address translation.What are the two primary types of NAT?
سؤال
How can using two firewalls help in protecting your network?
سؤال
How does a server farm and load-balancing software figure into the multiple DMZ/firewall configuration?
سؤال
What is a reverse firewall and why would you use one?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Firewall Design and Management
1
Which type of security device can speed up Web page retrieval and shield hosts on the internal network?

A) caching firewall
B) proxy server
C) caching-only DNS server
D) DMZ intermediary
B
2
What is a step you can take to harden a bastion host?

A) enable additional services to serve as honeypots
B) open several ports to confuse attackers
C) configure several extra accounts with complex passwords
D) remove unnecessary services
D
3
Proxy servers take action based only on IP header information.
False
4
Which of the following is true about a screening router?

A) it examines the data in the packet to make filtering decisions
B) it can stop attacks from spoofed addresses
C) it maintains a state table to determine connection information
D) it should be combined with a firewall for better security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
In what type of attack are zombies usually put to use?

A) buffer overrun
B) virus
C) DDoS
D) spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
What do you call a firewall that is connected to the Internet,the internal network,and the DMZ?

A) multi-homed proxy
B) three-pronged firewall
C) three-way packet filter
D) multi-zone host
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
A screened host has a router as part of the configuration.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is a disadvantage of using a proxy server?

A) shields internal host IP addresses
B) slows Web page access
C) may require client configuration
D) can't filter based on packet content
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
What should you consider installing if you want to inspect packets as they leave the network?

A) security workstation
B) RIP router
C) filtering proxy
D) reverse firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following best describes a bastion host?

A) a host with two or more network interfaces
B) a computer on the perimeter network that is highly protected
C) a computer running a standard OS that also has proxy software installed
D) a computer running only embedded firmware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which type of firewall configuration protects public servers by isolating them from the internal network?

A) screened subnet DMZ
B) dual-homed host
C) screening router
D) reverse firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which network device works at the Application layer by reconstructing packets and forwarding them to Web servers?

A) Layer 7 switch
B) translating gateway
C) proxy server
D) ICMP redirector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following best describes a DMZ?

A) a network of computers configured with robust firewall software
B) a subnet of publicly accessible servers placed outside the internal network
C) a private subnet that is inaccessible to both the Internet and the company network
D) a proxy server farm used to protect the identity of internal servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
A dual-homed host has a single NIC with two MAC addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is true about a dual-homed host?

A) serves as a single point of entry to the network
B) its main objective is to stop worms and viruses
C) uses a single NIC to manage two network connections
D) it is used as a remote access server in some configurations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
The TCP normalization feature forwards abnormal packets to an administrator for further inspection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Where should network management systems generally be placed?

A) out of band
B) in the DMZ
C) on the perimeter
D) in the server farm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Reverse firewalls allow all incoming traffic except what the ACLs are configured to deny.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is best described as software that prioritizes and schedules requests and then distributes them to servers based on each server's current load and processing power.

A) server pooling software
B) traffic distribution filter
C) priority server farm
D) load-balancing software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
What is a critical step you should take on the OS you choose for a bastion host?

A) ensure all security patches are installed
B) make sure it is the latest OS version
C) choose an obscure OS with which attackers are unfamiliar
D) customize the OS for bastion operation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
In a screened ____________ setup,a router is added between the host and the Internet to carry out IP packet filtering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
a process that uses the source and destination TCP and UDP port addresses to map traffic between internal and external hosts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
What is the term used for a computer placed on the network perimeter that is meant to attract attackers?

A) bastion host
B) honeypot
C) proxy decoy
D) virtual server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
a group of servers connected in a subnet that work together to receive requests
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which type of translation should you use if you need 50 computers in the corporate network to be able to access the Internet using a single public IP address?

A) one-to-one NAT
B) port address translation
C) one-to-many NAT
D) DMZ proxy translation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
a router placed between an untrusted network and an internal network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
software that prioritizes and schedules requests and then distributes them to servers in a server cluster based on each server's current load and processing power
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which type of NAT is typically used on devices in the DMZ?

A) one-to-one NAT
B) port address translation
C) one-to-many NAT
D) many-to-one NAT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
a firewall with separate interfaces connected to an untrusted network,a semitrusted network,and a trusted network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
software that forwards packets to and from the network being protected and caches Web pages to speed up network performance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
A _______________ router determines whether to allow or deny packets based on their source and destination IP addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
A primary goal of proxy servers is to provide security at the _______________ layer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Why is a bastion host the system most likely to be attacked?

A) it has weak security
B) it contains company documents
C) it is available to external users
D) it contains the default administrator account
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
You can ______________ a bastion host by removing unnecessary accounts and services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
a host in which one interface is connected to an internal network and the other interface is connected to a router to an untrusted network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
A DMZ is a subnet of _____________ accessible servers placed outside the internal network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
a device that filters outgoing connections
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
the process of mapping one internal IP address to one external IP address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following is true about private IP addresses?

A) they are assigned by the IANA
B) they are not routable on the Internet
C) they are targeted by attackers
D) NAT was designed to conserve them
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
MATCHING
a.dual-homed host
b.load-balancing software
c.many-to-one NAT
d.one-to-one NAT
e.proxy server
f.reverse firewall
g.screened host
h.screening router
i.server farm
j.three-pronged firewall
a computer configured with more than one network interface
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are the 8 general steps for creating a bastion host?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is a honeypot and how is one used to help protect the network?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Describe the setup in which a dual-homed host is used.What are the limitations of this configuration?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
How does a screened host setup differ from a dual-homed host configuration? Why might you choose this configuration?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What are the primary and secondary goals of modern proxy servers?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What is a bastion host and how is one typically configured?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Describe the process of network address translation.What are the two primary types of NAT?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
How can using two firewalls help in protecting your network?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
How does a server farm and load-balancing software figure into the multiple DMZ/firewall configuration?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What is a reverse firewall and why would you use one?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.