Deck 6: Firewall Configuration and Administration

ملء الشاشة (f)
exit full mode
سؤال
SSL supports firewall-based ____.

A) IP forwarding
B) encryption
C) VPN
D) application proxy
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The IP range 10.x.x.x provides about ____ addresses.

A) 16.5 billion
B) 16.5 million
C) 1.05 million
D) 65,500
سؤال
The formula for calculating memory usage for Check Point's FW-1 NG firewall is ____.

A) MemoryUsage = (AverageLifetime)/(ConcurrentConnections)/(AverageLifetime + 50 seconds)*120
B) MemoryUsage =(AverageLifetime)/ (ConcurrentConnections)*(AverageLifetime + 50 seconds)*120
C) MemoryUsage = (ConcurrentConnections)/(AverageLifetime)+(AverageLifetime + 50 seconds)+120
D) MemoryUsage = (ConcurrentConnections)/(AverageLifetime)*(AverageLifetime + 50 seconds)*120
سؤال
The firewall administrator should test the firewall and evaluate its performance to ensure that the network traffic is moving efficiently.
سؤال
The ____ approach processes firewall rules in top-to-bottom order.

A) Deny All
B) In Order
C) Best Fit
D) Last Fit
سؤال
If the primary goal of a firewall is to block unauthorized access, the emphasis needs to be on restricting rather than enabling connectivity
سؤال
With the ____ approach, the firewall determines the order in which the rules are processed.

A) Deny All
B) In Order
C) Best Fit
D) Last Fit
سؤال
The cornerstone of most firewalls is the ____, a set of instructions based on organizational policy, configured by the administrator.

A) rule set
B) IP forwarding set
C) packet filter
D) DNS
سؤال
It is good practice to set aside time to perform firewall maintenance ____.

A) daily
B) weekly
C) monthly
D) yearly
سؤال
____ firewalls are installed at all endpoints of the network, including the remote computers that connect to the network through VPNs.

A) Distributed
B) Remote
C) Integrated
D) Routing
سؤال
If you decide to first restrict all transmissions through the gateway except a specific set of services, you are following the principle of ____.

A) deny all
B) least privilege
C) connectivity
D) permissive approach
سؤال
Any firewall hardware can support a proxy server.
سؤال
If a proxy server is in service, ____ should be disabled on routers and other devices that lie between the networks.

A) PAT
B) NAT
C) DNS
D) IP forwarding
سؤال
____ is the hub for a large mailing list that features frequent announcements about security flaws.

A) Common Vulnerabilities and Exposures Database
B) CERT Coordination Center
C) SecurityFocus
D) The National Vulnerability Database
سؤال
____ provides a baseline index point for evaluating coverage of tools and services.

A) Common Vulnerabilities and Exposures Database
B) CERT Coordination Center
C) SecurityFocus
D) The National Vulnerability Database
سؤال
Different types of hardware can be secured in different ways, but one of the most important ways is to ____.

A) never update once you have a good configuration defined
B) buy products from the same brand
C) only use on network administrator
D) choose good passwords that you then guard closely
سؤال
A(n) ____ approach allows all packets to pass through except those specified to be blocked.

A) Allow-All
B) Allow-Some
C) Port 80
D) Except Video
سؤال
Computer systems have failed when critical computers were placed on the top floor of buildings that were poorly air conditioned.
سؤال
One of the disadvantages of a load-sharing setup is that total network performance declines.
سؤال
A firewall must be ____ so its performance can grow along with the network it protects.

A) productive
B) extensible
C) scalable
D) robust
سؤال
Having a ____ password in place prevents someone from starting up your computer and accessing your hard disk files with a floppy disk called a boot disk.

A) BIOS
B) screen saver
C) supervisor
D) startup
سؤال
The ____ lets you extend their functionality and integrate virus scanning into their set of abilities.

A) Border Gateway Protocol (BGP)
B) Open Shortest Path First (OSPF)
C) Open Platform for Security (OPSEC)
D) Content Vectoring Protocol (CVP)
سؤال
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Set of rules that blocks all access by default, and then permits only specific types of traffic to pass through.
سؤال
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
The practice of storing data in a part of disk storage space so it can be retrieved as needed.
سؤال
A ____ network monitors the operation of the primary firewall and synchronizes the state table connections so the two firewalls have the same information at any given time

A) caching
B) load balancing
C) hot standby
D) heartbeat
سؤال
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Tell the firewall what types of traffic to let in and out of your network.
سؤال
The even distribution of traffic among two or more load-sharing firewalls can be achieved through the use of ____________________ switches, which are network devices with the intelligence to make routing decisions based on source and destination IP address or port numbers as specified in Layer 4 of the OSI reference model.
سؤال
The administrator should periodically review a firewall's ____________________ and analyze the traffic that passes through the firewall, paying particular attention to suspicious activity.
سؤال
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Of central importance to the operation of the firewall software that it hosts.
سؤال
____ of frequently accessed resources, such as Web page text and image files, can dramatically speed up the performance of your network because it reduces the load on your Web servers.

A) Hashing
B) Caching
C) Redundancy
D) Load balancing
سؤال
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Must be entered to complete the process of starting up a computer.
سؤال
A(n) ____________________ interface is software that enables you to configure and monitor one or more firewalls that are located at different network locations.
سؤال
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Primary intent is to let all traffic through and then block specific types of traffic.
سؤال
A critical ____________________ is defined as a software- or hardware-related item that is indispensable to the operation of a device or program.
سؤال
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Enables a packet to get from one network's OSI stack of interfaces to another.
سؤال
Many companies use the Internet to enable a(n) ____________________ that connects internal hosts with specific clients in other organizations.
سؤال
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Used to gain access to the BIOS set-up program or to change the BIOS password.
سؤال
In 2003, GASSP was succeeded by ____.

A) GAAP
B) CISSP
C) GAISP
D) GASSPv2
سؤال
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Password you need to enter to make your screen saver vanish so you can return to your desktop and resume working.
سؤال
GAISP recommends the ____ management of IT assets and resources.

A) environmental
B) network
C) remote
D) integrated
سؤال
How should a firewall administrator guard against new risks?
سؤال
Describe the need for firewall scalability.
سؤال
List the critical resources for a firewall's successful operation.
سؤال
What is an intrusion detection and prevention system?
سؤال
Describe the importance of the bastion host's performance.
سؤال
Describe best practices for adding software updates and patches.
سؤال
What is a screen saver password? Why is it important?
سؤال
Describe the Content Vectoring Protocol (CVP).
سؤال
What are the GAISP nine Pervasive Principles?
سؤال
What is IP forwarding?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 6: Firewall Configuration and Administration
1
SSL supports firewall-based ____.

A) IP forwarding
B) encryption
C) VPN
D) application proxy
B
2
The IP range 10.x.x.x provides about ____ addresses.

A) 16.5 billion
B) 16.5 million
C) 1.05 million
D) 65,500
B
3
The formula for calculating memory usage for Check Point's FW-1 NG firewall is ____.

A) MemoryUsage = (AverageLifetime)/(ConcurrentConnections)/(AverageLifetime + 50 seconds)*120
B) MemoryUsage =(AverageLifetime)/ (ConcurrentConnections)*(AverageLifetime + 50 seconds)*120
C) MemoryUsage = (ConcurrentConnections)/(AverageLifetime)+(AverageLifetime + 50 seconds)+120
D) MemoryUsage = (ConcurrentConnections)/(AverageLifetime)*(AverageLifetime + 50 seconds)*120
D
4
The firewall administrator should test the firewall and evaluate its performance to ensure that the network traffic is moving efficiently.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
The ____ approach processes firewall rules in top-to-bottom order.

A) Deny All
B) In Order
C) Best Fit
D) Last Fit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
If the primary goal of a firewall is to block unauthorized access, the emphasis needs to be on restricting rather than enabling connectivity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
With the ____ approach, the firewall determines the order in which the rules are processed.

A) Deny All
B) In Order
C) Best Fit
D) Last Fit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
The cornerstone of most firewalls is the ____, a set of instructions based on organizational policy, configured by the administrator.

A) rule set
B) IP forwarding set
C) packet filter
D) DNS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
It is good practice to set aside time to perform firewall maintenance ____.

A) daily
B) weekly
C) monthly
D) yearly
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
____ firewalls are installed at all endpoints of the network, including the remote computers that connect to the network through VPNs.

A) Distributed
B) Remote
C) Integrated
D) Routing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
If you decide to first restrict all transmissions through the gateway except a specific set of services, you are following the principle of ____.

A) deny all
B) least privilege
C) connectivity
D) permissive approach
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Any firewall hardware can support a proxy server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
If a proxy server is in service, ____ should be disabled on routers and other devices that lie between the networks.

A) PAT
B) NAT
C) DNS
D) IP forwarding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
____ is the hub for a large mailing list that features frequent announcements about security flaws.

A) Common Vulnerabilities and Exposures Database
B) CERT Coordination Center
C) SecurityFocus
D) The National Vulnerability Database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ provides a baseline index point for evaluating coverage of tools and services.

A) Common Vulnerabilities and Exposures Database
B) CERT Coordination Center
C) SecurityFocus
D) The National Vulnerability Database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Different types of hardware can be secured in different ways, but one of the most important ways is to ____.

A) never update once you have a good configuration defined
B) buy products from the same brand
C) only use on network administrator
D) choose good passwords that you then guard closely
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
A(n) ____ approach allows all packets to pass through except those specified to be blocked.

A) Allow-All
B) Allow-Some
C) Port 80
D) Except Video
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Computer systems have failed when critical computers were placed on the top floor of buildings that were poorly air conditioned.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
One of the disadvantages of a load-sharing setup is that total network performance declines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
A firewall must be ____ so its performance can grow along with the network it protects.

A) productive
B) extensible
C) scalable
D) robust
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Having a ____ password in place prevents someone from starting up your computer and accessing your hard disk files with a floppy disk called a boot disk.

A) BIOS
B) screen saver
C) supervisor
D) startup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
The ____ lets you extend their functionality and integrate virus scanning into their set of abilities.

A) Border Gateway Protocol (BGP)
B) Open Shortest Path First (OSPF)
C) Open Platform for Security (OPSEC)
D) Content Vectoring Protocol (CVP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Set of rules that blocks all access by default, and then permits only specific types of traffic to pass through.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
The practice of storing data in a part of disk storage space so it can be retrieved as needed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
A ____ network monitors the operation of the primary firewall and synchronizes the state table connections so the two firewalls have the same information at any given time

A) caching
B) load balancing
C) hot standby
D) heartbeat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Tell the firewall what types of traffic to let in and out of your network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
The even distribution of traffic among two or more load-sharing firewalls can be achieved through the use of ____________________ switches, which are network devices with the intelligence to make routing decisions based on source and destination IP address or port numbers as specified in Layer 4 of the OSI reference model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
The administrator should periodically review a firewall's ____________________ and analyze the traffic that passes through the firewall, paying particular attention to suspicious activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Of central importance to the operation of the firewall software that it hosts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
____ of frequently accessed resources, such as Web page text and image files, can dramatically speed up the performance of your network because it reduces the load on your Web servers.

A) Hashing
B) Caching
C) Redundancy
D) Load balancing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Must be entered to complete the process of starting up a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
A(n) ____________________ interface is software that enables you to configure and monitor one or more firewalls that are located at different network locations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Primary intent is to let all traffic through and then block specific types of traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
A critical ____________________ is defined as a software- or hardware-related item that is indispensable to the operation of a device or program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Enables a packet to get from one network's OSI stack of interfaces to another.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Many companies use the Internet to enable a(n) ____________________ that connects internal hosts with specific clients in other organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Used to gain access to the BIOS set-up program or to change the BIOS password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
In 2003, GASSP was succeeded by ____.

A) GAAP
B) CISSP
C) GAISP
D) GASSPv2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Match each item with a statement below.
a.boot-up password
b.firewall rules
c.bastion host
d.screen saver password
e.restrictive
f.IP forwarding
g.permissive
h.supervisor password
i.caching
Password you need to enter to make your screen saver vanish so you can return to your desktop and resume working.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
GAISP recommends the ____ management of IT assets and resources.

A) environmental
B) network
C) remote
D) integrated
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
How should a firewall administrator guard against new risks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Describe the need for firewall scalability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
List the critical resources for a firewall's successful operation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What is an intrusion detection and prevention system?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Describe the importance of the bastion host's performance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Describe best practices for adding software updates and patches.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What is a screen saver password? Why is it important?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Describe the Content Vectoring Protocol (CVP).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What are the GAISP nine Pervasive Principles?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What is IP forwarding?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.