Filters
Question type

Study Flashcards

The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header.

A) True
B) False

Correct Answer

verifed

verified

An important aspect of a distributed firewall configuration is _________ .


A) change control
B) network frame locking
C) security monitoring
D) configuration alerting

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

An example of application level gateway implementation is the SOCKS package.

A) True
B) False

Correct Answer

verifed

verified

One advantage of a packet filtering firewall is its simplicity.

A) True
B) False

Correct Answer

verifed

verified

A typical use of a _________ is a situation in which the system administrator trusts the internal users.


A) packet filtering firewall
B) circuit level gateway
C) application level gateway
D) stateful inspection firewall

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

________ has a third network interface on bastion to a DMZ where externally visible servers are placed.This is a common appliance configuration for medium to large organizations.


A) double bastion inline
B) double bastion T
C) single bastion inline
D) single bastion T

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Four types of firewalls are: Packet filtering, stateful inspection, circuit level proxy and _________ .

Correct Answer

verifed

verified

The _________ is the address of the system that originated the IP packet.


A) Interface
B) Source and destination transport level address
C) IP protocol field
D) Source IP address

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Due to the small number of variables used in access control decisions packet filter firewalls are susceptible to security breaches caused by improper configurations.

A) True
B) False

Correct Answer

verifed

verified

A circuit level proxy can be a stand alone system or it can be a specialized function performed by an application level gateway for certain applications.

A) True
B) False

Correct Answer

verifed

verified

The direction control determines the types of Internet services that can be accessed, inbound or outbound.

A) True
B) False

Correct Answer

verifed

verified

The default _________ policy increases ease of use for end users but provides reduced security because the security administrator must, in essence, react to each new security threat as it becomes known.

Correct Answer

verifed

verified

_________ can be an effective means of protecting a local system or network of systems from network based security threats while at the same time affording access to the outside world via wide area networks and the Internet.

Correct Answer

verifed

verified

A __________ attack is where the source station specifies the route that a packet should take as it crosses the Internet in the hopes that this will bypass security measures that do not analyze the source routing information.

Correct Answer

verifed

verified

The _________ attack is designed to circumvent filtering rules that depend on TCP header information.


A) source routing
B) IP address spoofing
C) network layer address spoofing
D) tiny fragment

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

A firewall may not act as a packet filter.

A) True
B) False

Correct Answer

verifed

verified

Common for large businesses and government organizations, the ________ configuration is required for Australian government use.


A) Double bastion inline
B) Double bastion T
C) Single bastion inline
D) Single bastion T

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

The _________ is the transport level port number which defines applications such as SNMP or TELNET.


A) Source IP address
B) IP protocol field
C) Source and destination transport level address
D) Interface

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

A _________ sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host.Once the two connections are established TCP segments from one connection are relayed to the other without examining the contents.

Correct Answer

verifed

verified

circuit le...

View Answer

Firewall functionality can also be implemented as a software module in a router or LAN switch.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 45

Related Exams

Show Answer