Filters
Question type

The ________ field in a firewall policy database describes what firewalls should do with a service.


A) action
B) track
C) firewalls
D) service

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following is NOT a typical way that attackers may avoid firewall filtering?


A) Internal attackers
B) Compromised internal hosts
C) Wireless LAN hackers
D) Border firewalls

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

One way to address threats for which no signature exists is to use anomaly detection.

A) True
B) False

Correct Answer

verifed

verified

Neither static packet filter firewalls nor application proxy firewalls examine application messages.

A) True
B) False

Correct Answer

verifed

verified

If a packet received by the firewall is not a provable attack packet, what happens?


A) Day and time are logged in a log file.
B) It is noted as a suspicious packet in the log file.
C) It passes it on to its destination.
D) It remains stored in an authentication server.

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

________ are high-level statements to guide firewall implementation.


A) Firewall policies
B) Connections
C) Sockets
D) Firewall policy management servers

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Static packet filtering has many limitations and is no longer typically used as a primary filtering mechanism.

A) True
B) False

Correct Answer

verifed

verified

Which of the following offer internal IP address hiding and header destruction?


A) Application proxy firewalls
B) Unified threat management firewalls
C) Egress firewalls
D) Static packet filter firewalls

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Showing 61 - 68 of 68

Related Exams

Show Answer