Filters
Question type

Study Flashcards

In the OSI model, level 1 is the ____ layer.


A) physical
B) data link
C) transport
D) application

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

What are some of the advanced security functions provided by modern firewalls?

Correct Answer

verifed

verified

Logging unauthorized (as well as authori...

View Answer

What is User Datagram Protocol (UDP)?

Correct Answer

verifed

verified

This protocol is similar to TCP in that ...

View Answer

____________________ inspection blocks packets that are sent from an external computer that does not have a currently active connection to an internal computer.

Correct Answer

verifed

verified

Mobile devices such as laptops, PDAs, and smartphones blur the perimeter boundary.

A) True
B) False

Correct Answer

verifed

verified

Ports numbers range from 0 to ____.


A) 1024
B) 3999
C) 65,535
D) 786,568

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Match each item with a statement below. -Function as an outbound network-level proxy.


A) PAT and NAT
B) bastion host
C) application proxy
D) extranet
E) header
F) perimeter
G) data
H) port
I) packet filtering

J) A) and H)
K) E) and G)

Correct Answer

verifed

verified

Describe each generation of firewalls.

Correct Answer

verifed

verified

First-generation firewalls are static pa...

View Answer

A(n) ____________________ is an extended network that shares part of an organization's network with third parties.

Correct Answer

verifed

verified

Firewalls provide ____ services by examining packet headers and allowing traffic that conforms to estalished rules to continue.


A) packet filtering
B) NAT
C) application proxy
D) TCP/IP

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Packet-filtering firewalls examine every incoming packet _____ and can selectively filter packets.


A) transport
B) session
C) header
D) data

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

How do firewalls help document what happens on a network?

Correct Answer

verifed

verified

Every firewall should be configured to p...

View Answer

A ____ firewall enables you to log passing traffic, protecting the whole network at one time.


A) stateful
B) stateless
C) perimeter
D) DMZ

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Match each item with a statement below. -Consists of general information about the size of the packet, the protocol that was used to send it, and the IP address of both the source computer and the destination


A) PAT and NAT
B) bastion host
C) application proxy
D) extranet
E) header
F) perimeter
G) data
H) port
I) packet filtering

J) A) and E)
K) A) and D)

Correct Answer

verifed

verified

____ are commonly used to connect two companies networks over the Internet in a site-to-site configuration.


A) Bastion hosts
B) VPNs
C) Proxy servers
D) Stateful proxies

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A firewall may also help prevent some Trojan horses from leveraging the local network through unauthorized service ports called ____.


A) back doors
B) application proxies
C) perimeters
D) content locks

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

____ firewalls can be used to perform load balancing.


A) Application gateway
B) Stateful
C) Stateless
D) NAT

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Firewalls can be used to host ____ to reduce server load and improve Web-site performance.


A) logging
B) shielding hosts
C) VPN
D) cached data

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Port numbers come in two flavors: well-known ports and ____________________ ports.

Correct Answer

verifed

verified

A firewall is designed to prevent all attackers, viruses, and would-be intruders from entering a computer or computer network.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 49

Related Exams

Show Answer