Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
15.01
In general, firewalls work by ___________________. A. Rejecting all packets regardless of security restrictions B. Forwarding all packets regardless of security restrictions C. Allowing only packets that pass security restrictions to be forwarded D. None of the above |
In general, firewalls work by ___________________. A. Rejecting all packets regardless of security restrictions B. Forwarding all packets regardless of security restrictions C. Allowing only packets that pass security restrictions to be forwarded D. None of the above |
|
15.02 Which layer of the OSI model do software firewalls operate in? (Choose all that apply.) A. Application B. Presentation C. Physical D. Network |
Which layer of the OSI model do software firewalls operate in? (Choose all that apply.) A. Application B. Presentation C. Physical D. Network |
|
15.03 What is the main difference between a network-based firewall and a host-based firewall? A. A network-based firewall protects the Internet from attacks. B. A network-based firewall protects a network, not just a single host. C. A network-based firewall protects the network wires. D. A network-based firewall protects a CD from data loss. |
What is the main difference between a network-based firewall and a host-based firewall? A. A network-based firewall protects the Internet from attacks. B. A network-based firewall protects a network, not just a single host. C. A network-based firewall protects the network wires. D. A network-based firewall protects a CD from data loss. |
|
15.04 What is one advantage that a stateless firewall has over its stateful counterparts? A. It’s faster. B. It utilizes less memory. C. It’s better at preventing network attacks. D. It works better on external networks. |
What is one advantage that a stateless firewall has over its stateful counterparts? A. It’s faster. B. It utilizes less memory. C. It’s better at preventing network attacks. D. It works better on external networks. |
|
15.05 A network administrator needs to filter unwanted packets when implementing the company's’ security policies. What should be implemented to help exercise control over future network traffic? A. Access control list (ACL) B. Proxy server C. Intrusion Prevention System D. VPN concentrator |
A network administrator needs to filter unwanted packets when implementing the company's’ security policies. What should be implemented to help exercise control over future network traffic? A. Access control list (ACL) (ACL’s allow routers to filter packets, and give admins greater control over network traffic.) B. Proxy server C. Intrusion Prevention System D. VPN concentrator |
|
15.06 What is the benefit of using a firewall? A. Protects external users B. Protects external hardware C. Protects LAN resources D. Protects hardware from failure |
What is the benefit of using a firewall? A. Protects external users B. Protects external hardware C. Protects LAN resources D. Protects hardware from failure |
|
15.07 Your company uses a custom TCP port number of 9080 that is hosted on your DMZ server. Users can no longer access a custom application that uses this port. You’ve verified that the firewall is permitting this TCP port. Which command can you use to verify the DMZ server is still accepting connections on TCP port 9080? A. ping B. telnet C. nbtstat D. netstat E. ipconfig |
Your company uses a custom TCP port number of 9080 that is hosted on your DMZ server. Users can no longer access a custom application that uses this port. You’ve verified that the firewall is permitting this TCP port. Which command can you use to verify the DMZ server is still accepting connections on TCP port 9080? A. ping B. telnet C. nbtstat D. netstat E. ipconfig |
|
15.08 Which device can limit traffic on a network and allow access onto specific TCP/IP port numbers when security is a concern? A. Hub B. Firewall C. DNS D. Modem |
Which device can limit traffic on a network and allow access onto specific TCP/IP port numbers when security is a concern? A. Hub B. Firewall C. DNS D. Modem |
|
15.09 Which is not a type of access control list (ACL)? A. Standard B. Extended C. Referred D. Outbound |
Which is not a type of access control list (ACL)? A. Standard B. Extended C. Referred D. Outbound |
|
15.10 A network administrator is creating an outbound ACL. Which of the following is not a general access-list guideline that should be followed when the network administrator is creating and implementing ACLs on the router? A. Use only one ACL per interface per protocol per direction. B. Place IP-extended ACLs as far away from the source as possible. C. Create ACLs and then apply them to an interface. D. Every list should have at least one permit statement or it will deny all traffic. |
A network administrator is creating an outbound ACL. Which of the following is not a general access-list guideline that should be followed when the network administrator is creating and implementing ACLs on the router? A. Use only one ACL per interface per protocol per direction. B. Place IP-extended ACLs as far away from the source as possible. C. Create ACLs and then apply them to an interface. D. Every list should have at least one permit statement or it will deny all traffic. |
|
15.11 What is the best explanation for a DMZ? A. To separate a security zone for an IPS and IDS server B. To create a security zone for VPN terminations C. To create a security zone that allows public traffic but is isolated from the private inside network D. To create a security zone that allows private traffic but is isolated from the public network |
What is the best explanation for a DMZ? A. To separate a security zone for an IPS and IDS server B. To create a security zone for VPN terminations C. To create a security zone that allows public traffic but is isolated from the private inside network D. To create a security zone that allows private traffic but is isolated from the public network |
|
15.12 Which of the following are types of services that firewalls can provide? (Choose all that apply.) A. Content filtering B. Segregate network segments C. Signature identification D. Scanning services E. All of the above |
Which of the following are types of services that firewalls can provide? (Choose all that apply.) A. Content filtering B. Segregate network segments C. Signature identification D. Scanning services E. All of the above |
|
15.13 Which type of security device monitors network traffic, looking for signs of an intrusion? A. Intrusion Detection System B. Demilitarized zone (DMZ) C. Firewall D. VPN concentrator |
Which type of security device monitors network traffic, looking for signs of an intrusion? A. Intrusion Detection System B. Demilitarized zone (DMZ) C. Firewall D. VPN concentrator |
|
15.14 Which of these application-layer protocols is not secure? A. SSH B. HTTP C. HTTPS D. SNMPv3 |
Which of these application-layer protocols is not secure? A. SSH B. HTTP C. HTTPS D. SNMPv3 |
|
15.15 Which of these application-layer protocols is secure? A. SFTP B. RSH C. SNMPv1 D. SNMPv2 |
Which of these application-layer protocols is secure? A. SFTP (Note that SMTPv3 is secure, but v1 and v2 are not.) B. RSH C. SNMPv1 D. SNMPv2 |
|
15.16 Changing network configurations, terminating sessions, and deceiving the attacker are actions that can be taken from what type of security device? A. Access control list (ACL) B. Content filtering C. Security zones D. Intrusion Prevention System (IPS) |
Changing network configurations, terminating sessions, and deceiving the attacker are actions that can be taken from what type of security device? A. Access control list (ACL) B. Content filtering C. Security zones D. Intrusion Prevention System (IPS) |
|
15.17 Which of the following are access-control principles that should be followed? (Choose all that apply.) A. Use implicit deny or allow. B. Follow the least-privilege model. C. Separate out administrative duties. D. Rotate administrator jobs. E. All of the above |
Which of the following are access-control principles that should be followed? (Choose all that apply.) A. Use implicit deny or allow. B. Follow the least-privilege model. C. Separate out administrative duties. D. Rotate administrator jobs. E. All of the above<.b> |
|
15.18 Which protocol uses port 22 by default? A. Telnet B. FTP C. SSH D. HTTPS |
Which protocol uses port 22 by default? A. Telnet B. FTP C. SSH D. HTTPS |
|
15.19 A network administrator needs to transfer files from one computer to another. What protocol would most likely be used in this scenario? A. Telnet B. FTP C. HTTP D. RCP |
A network administrator needs to transfer files from one computer to another. What protocol would most likely be used in this scenario? A. Telnet B. FTP C. HTTP D. RCP |
|
15.20 What protocol can be used to transfer files and is similar to FTP but not secure? A. SCP B. SFTP C. SSH D. TFTP |
What protocol can be used to transfer files and is similar to FTP but not secure? A. SCP B. SFTP C. SSH D. TFTP (This question is phrased odd, since FTP is not secure either.) |
|
15.21 Which type of security device employs a redirection device known as a honeypot? |
Intrusion Prevention System |
|
15.22 Which type of firewall keeps track of existing connections passing through it? |
Stateful |
|
15.23 If you wanted to ensure that your firewall could block inflammatory email, which type of service would you look for? |
Content filtering |
|
15.24 A firewall’s list of rules that it uses to block traffic is called ___________________. |
Access Control List (ACL) |
|
15.25 If you wanted to allow remote access to 500 users, which type of device is recommended? |
A VPN concentrator |
|
15.26 If data from one of your subnets should be restricted from entering another subnet, the subnets should be configured as different ___________________. |
Security zones |
|
15.27 Which unsecure protocol uses port 80 by default? |
HTTP |
|
15.28 Which unsecure protocol utilizes arbitrary port numbers to complete its work? |
FTP |
|
15.29 What port number does Secure Shell (SSH) use by default? |
22 |
|
15.30 Logging, notification, and shunning are what types of reactions from what type of security device? |
Passive reactions from an IDS |