• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back

Which of the following describes an access control list (ACL)?

A mechanism that defines traffic or an event to apply an authorization control of allow or deny against

Which of the following is given to a notification from a firewall that a specific event or packet was detected?

Alert

What is anomaly-based detection?

A form of intrusion detection system/intrusion prevention system (IDS/ IPS) based on a defined normal, often defined using rules similar to firewall rules.

Which of the following is a technique for storing or copying log events to a centralized logging server?

Syslog

Which term describes a security stance that prevents all communications except those enabled by specific allow exceptions? Syslog

Deny by default/Allow by exception

Which of the following describes fair queuing?

A technique of load balancing that operates by sending the next transaction to the firewall with the least current workload.

Which of the following refers to an event that does not trigger an alarm but should have, due to the traffic or event actually being abnormal and/or malicious?

False negative

Which of the following is not a protection against fragmentation attacks?

Using firewalking

Which of the following can improve firewall performance?

Load balancing

Which name is given to a hacking technique used against static packet filtering firewalls to discover the rules or filters controlling inbound traffic?

Firewalking

Which of the following is a firewall rule that prevents internal users from accessing public FTP sites?You Answered TCP ANY ANY ANY FTP Deny

TCP 192.168.42.0/24 ANY ANY 21 Deny

Which of the following refers to the deployment of a firewall as an all-encompassing primary gateway security solution?

Unified threat management (UTM)

Which of the following hands out tasks in a repeating non-priority sequence?

Round robin

Which of the following is described as the maximum communication or transmission capability of a network segment?

Wirespeed

Unified threat management (UTM) has the advantage of managing multiple security services from a single interface.

True

Authentication and authorization are must be used together.

False

A false negative is an event that triggers an alarm when the traffic or event is abnormal and/or malicious.

False

Firewalking is a hacking technique used against static packet filtering firewalls to discover the rules or filters controlling inbound traffic.

True

Overlapping occurs when full or partial overwriting of datagram components creates new datagrams out of parts of previous datagrams.

True

Denial of service (DoS) attacks cannot be detected by a firewall.

False

asd

asd