• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back

Which of the following are four basic types of firewalls?


  1. Screening, bastion, dual-homed, circuit level

  2. Application gateway, bastion, dual-homed, screening

  3. Stateful packet inspection, gateway, bastion, screening

Anws C. Packet filtering, application gateway, circuit level, stateful packet inspection

Which type of firewall creates a private virtual connection with the client?

1. Bastion


2. Dual-homed


3. Application gateway


4. Circuit-level gateway

Circuit level Gateway

1. Which type of firewall is considered the most secure?


  1. Dual-homed

  2. Stateful packet inspection

  3. Circuit-level gateway

  4. Packet screening

B. Stateful packet inspection

2. What four rules must be set for packet filtering firewalls?


  1. Protocol type, source port, destination port, source IP

  2. Protocol version, destination IP, source port, username

  3. Username, password, protocol type, destination IP

  4. Source IP, destination IP, username, password

  • What types of protocols to allow (FTP, SMTP, POP3, etc.)

  • What source ports to allow

  • What destination ports to allow

  • What source IP addresses to allow (you can block certain IP

3. What type of firewall requires individual client applications to be authorized to connect?


  1. Screened gateway

  2. Stateful packet inspection

  3. Dual-homed

  4. Application gateway

D. Application Gateway

4.What four rules must be set for packet filtering firewalls?


  1. Protocol type, source port, destination port, source IP

  2. Protocol version, destination IP, source port, username

  3. Username, password, protocol type, destination IP

  4. Source IP, destination IP, username, password

Protocol type, source port, destination port, source IP

6. Why might a proxy gateway be susceptible to a flood attack?


  1. It does not properly filter packets.

  2. It does not require user authentication.

  3. It allows multiple simultaneous connections.

Its authentication method takes more time and resources.

7. Why might a circuit level gateway be inappropriate for some situations?


  1. It has no user authentication.

  2. It blocks Web traffic.

  3. It requires client-side configuration.

  4. It is simply too expensive.

It is simply too expensive.

8 Why is an SPI firewall less susceptible to spoofing attacks?


  1. It examines the source IP of all packets.

  2. It automatically blocks spoofed packets.

  3. It requires user authentication.

  4. It requires client application authentication.

It automatically blocks spoofed packets.

9. Why is an SPI firewall more resistant to flooding attacks?


  1. It automatically blocks large traffic from a single IP.

  2. It requires user authentication.

  3. It examines each packet in the context of previous packets.

  4. It examines the destination IP of all packets.

It examines each packet in the context of previous packets.

10 What is the greatest danger in a network host-based configuration?


  1. SYN flood attacks

  2. Ping flood attacks

  3. IP spoofing

  4. Operating system security flaws

Operating system security flaws

11.Which of the following is an advantage of the network host-based configuration?


  1. It is resistant to IP spoofing.

  2. It is inexpensive or free.

  3. It is more secure.

  4. It has user authentication.

It is inexpensive or free.

12. Which of the following can be shipped preconfigured?


  1. Stateful packet inspection firewalls

  2. Network host-based firewalls

  3. Router-based firewalls

  4. Dual-homed firewalls

Router-based firewalls

13. Which of the following solutions is actually a combination of firewalls?


  1. Screened firewalls

  2. Router-based firewalls

  3. Dual-homed firewalls

  4. Bastion host firewalls

Dual-homed firewalls

14. It should be routine for someone in the IT security staff to


  1. Test the firewall by attempting a ping flood

  2. Review firewall logs

  3. Reboot the firewall

  4. Physically inspect the firewall

Review firewall logs

15. What is the most important security advantage to NAT?


  1. It blocks incoming ICMP packets.

  2. It hides internal network addresses.

  3. By default it blocks all ICMP packets.

  4. By default it only allows outbound connections.

By default it only allows outbound connections.