Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
21 Cards in this Set
- Front
- Back
Which of the following describes an access control list (ACL)? |
A mechanism that defines traffic or an event to apply an authorization control of allow or deny against |
|
Which of the following is given to a notification from a firewall that a specific event or packet was detected? |
Alert |
|
What is anomaly-based detection? |
A form of intrusion detection system/intrusion prevention system (IDS/ IPS) based on a defined normal, often defined using rules similar to firewall rules.
|
|
Which of the following is a technique for storing or copying log events to a centralized logging server? |
Syslog
|
|
Which term describes a security stance that prevents all communications except those enabled by specific allow exceptions? Syslog |
Deny by default/Allow by exception |
|
Which of the following describes fair queuing? |
A technique of load balancing that operates by sending the next transaction to the firewall with the least current workload. |
|
Which of the following refers to an event that does not trigger an alarm but should have, due to the traffic or event actually being abnormal and/or malicious? |
False negative |
|
Which of the following is not a protection against fragmentation attacks? |
Using firewalking |
|
Which of the following can improve firewall performance? |
Load balancing |
|
Which name is given to a hacking technique used against static packet filtering firewalls to discover the rules or filters controlling inbound traffic? |
Firewalking |
|
Which of the following is a firewall rule that prevents internal users from accessing public FTP sites?You Answered TCP ANY ANY ANY FTP Deny |
TCP 192.168.42.0/24 ANY ANY 21 Deny |
|
Which of the following refers to the deployment of a firewall as an all-encompassing primary gateway security solution? |
Unified threat management (UTM) |
|
Which of the following hands out tasks in a repeating non-priority sequence? |
Round robin |
|
Which of the following is described as the maximum communication or transmission capability of a network segment? |
Wirespeed |
|
Unified threat management (UTM) has the advantage of managing multiple security services from a single interface. |
True |
|
Authentication and authorization are must be used together. |
False
|
|
A false negative is an event that triggers an alarm when the traffic or event is abnormal and/or malicious. |
False |
|
Firewalking is a hacking technique used against static packet filtering firewalls to discover the rules or filters controlling inbound traffic. |
True |
|
Overlapping occurs when full or partial overwriting of datagram components creates new datagrams out of parts of previous datagrams. |
True |
|
Denial of service (DoS) attacks cannot be detected by a firewall. |
False |
|
asd |
asd |