Deck 13: Hash Algorithms, Certificate Request, Firewall Types, and Dmz Setup

Full screen (f)
exit full mode
Question
The RSA signature uses which hash algorithm?

A)md5
B)sha-1
C)md5 and sha-1
D)none of the mentioned.
Use Space or
up arrow
down arrow
to flip the card.
Question
The certificate_request massage includes two parameters, one of which is-

A)certificate_extension
B)certificate_creation
C)certificate_exchange
D)certificate_type
Question
The client_key_exchange message uses a pre master key of size -

A)48 bytes
B)56 bytes
C)64 bytes
D)32 bytes
Question
Network layer firewall works as a

A)frame filter
B)packet filter
C)content filter
D)virus filter
Question
Network layer firewall has two sub- categories as                    

A)state full firewall and stateless firewall
B)bit oriented firewall and byte oriented firewall
C)frame firewall and packet firewall
D)network layer firewall and session layer firewall
Question
A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as

A)chock point
B)meeting point
C)firewall point
D)secure point
Question
Which of the following is / are the types of firewall?

A)packet filtering firewall
B)dual homed gateway firewall
C)screen host firewall
D)dual host firewall
Question
A proxy firewall filters at                    

A)physical layer
B)data link layer
C)network layer
D)application layer
Question
A packet filter firewall filters at

A)physical layer
B)data link layer
C)network layer or transport layer
D)application layer
Question
What is one advantage of setting up a DMZ with two firewalls?

A)you can control where traffic goes in three networks
B)you can do stateful packet filtering
C)you can do load balancing
D)improved network performance
Question
A firewall needs to be------------  so that it can grow proportionally with the network that it protects.

A)robust
B)expansive
C)fast
D)scalable
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/11
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Hash Algorithms, Certificate Request, Firewall Types, and Dmz Setup
1
The RSA signature uses which hash algorithm?

A)md5
B)sha-1
C)md5 and sha-1
D)none of the mentioned.
md5 and sha-1
2
The certificate_request massage includes two parameters, one of which is-

A)certificate_extension
B)certificate_creation
C)certificate_exchange
D)certificate_type
certificate_type
3
The client_key_exchange message uses a pre master key of size -

A)48 bytes
B)56 bytes
C)64 bytes
D)32 bytes
48 bytes
4
Network layer firewall works as a

A)frame filter
B)packet filter
C)content filter
D)virus filter
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
5
Network layer firewall has two sub- categories as                    

A)state full firewall and stateless firewall
B)bit oriented firewall and byte oriented firewall
C)frame firewall and packet firewall
D)network layer firewall and session layer firewall
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
6
A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as

A)chock point
B)meeting point
C)firewall point
D)secure point
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is / are the types of firewall?

A)packet filtering firewall
B)dual homed gateway firewall
C)screen host firewall
D)dual host firewall
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
8
A proxy firewall filters at                    

A)physical layer
B)data link layer
C)network layer
D)application layer
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
9
A packet filter firewall filters at

A)physical layer
B)data link layer
C)network layer or transport layer
D)application layer
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
10
What is one advantage of setting up a DMZ with two firewalls?

A)you can control where traffic goes in three networks
B)you can do stateful packet filtering
C)you can do load balancing
D)improved network performance
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
11
A firewall needs to be------------  so that it can grow proportionally with the network that it protects.

A)robust
B)expansive
C)fast
D)scalable
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 11 flashcards in this deck.