FIREWALLS VPNS Flashcards

1
Q
  1. Firewalls can be categorized by processing mode, development era, or structure.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. The firewall can often be deployed as a separate network containing a number of supporting devices.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Packet filtering firewalls scan network data packets looking for compliance with or violation of the rules of the firewall’s database.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. A packet’s structure is independent from the nature of the packet.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. The ability to restrict a specific service is now considered standard in most routers and is invisible to the user.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. The application firewall runs special software that acts as a proxy for a service request.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A Web server is often exposed to higher levels of risk when placed in the DMZ than when it is placed in the untrusted network.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Circuit gateway firewalls usually look at data traffic flowing between one network and another.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. The Cisco security kernel contains three component technologies: the Interceptor/Packet Analyzer, the Security Verification ENgine (SVEN), and Kernel Proxies.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Internal computers are always visible to the public network.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. The SMC Barricade residential broadband router does not have an intrusion detection feature.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. One method of protecting the residential user is to install a software firewall directly on the user’s system.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. There are limits to the level of configurability and protection that software firewalls can provide.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. All organizations with an Internet connection have some form of a router at the boundary between the organization’s internal networks and the external service provider.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. The DMZ cannot be a dedicated port on the firewall device linking a single bastion host.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. The screened subnet protects the DMZ systems and information from outside threats by providing a network of intermediate security.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Good policy and practice dictates that each firewall device, whether a filtering router, bastion host, or other firewall implementation
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Syntax errors in firewall policies are usually difficult to identify.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. When Web services are offered outside the firewall, HTTP traffic should be blocked from internal networks through the use of some form of proxy access or DMZ architecture.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Firewall Rule Set 1 states that responses to internal requests are not allowed.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Some firewalls can filter packets by protocol name.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. It is important that e-mail traffic reach your e-mail server and only your e-mail server.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Though not used much in Windows environments, Telnet is still useful to systems administrators on Unix/Linux systems.
A

T

24
Q
  1. A content filter is technically a firewall.
A

F

25
Q
  1. A content filter is essentially a set of scripts or programs that restricts user access to certain networking protocols and Internet locations.
A

T

26
Q
  1. Internet connections via dial-up and leased lines are becoming more popular.
A

F

27
Q
  1. The Extended TACACS version uses dynamic passwords and incorporates two-factor authentication.
A

F

28
Q
  1. Even if Kerberos servers are subjected to denial-of-service attacks, a client can request additional services.
A

F

29
Q
  1. A VPN allows a user to use the Internet into a private network.
A

T

30
Q
  1. On the client end, a user with Windows 2000 or XP can establish a VPN by configuring his or her system to connect to a VPN server.
A

T

31
Q
  1. Firewalls fall into ____ major processing-mode categories.
    a. two c. four
    b. three d. five
A

d. five

32
Q
  1. ____ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.
    a. Packet-filtering c. Circuit gateways
    b. Application gateways d. MAC layer firewalls
A

a. Packet-filtering

33
Q
  1. The restrictions most commonly implemented in packet-filtering firewalls are based on ____.
    a. IP source and destination address
    b. Direction (inbound or outbound)
    c. TCP or UDP source and destination port requests
    d. All of the above
A

d. All of the above

34
Q
  1. ____ filtering requires that the filtering rules governing how the firewall decides which packets are allowed and which are denied be developed and installed with the firewall.
    a. Dynamic c. Stateful
    b. Static d. Stateless
A

b. Static

35
Q
  1. A ____ filtering firewall can react to an emergent event and update or create rules to deal with the event.
    a. dynamic c. stateful
    b. static d. stateless
A

a. dynamic

36
Q
  1. ____ inspection firewalls keep track of each network connection between internal and external systems.
    a. Static c. Stateful
    b. Dynamic d. Stateless
A

c. Stateful

37
Q
  1. The application gateway is also known as a(n) ____.
    a. application-level firewall c. proxy firewall
    b. client firewall d. All of the above
A

a. application-level firewall

38
Q
  1. The proxy server is often placed in an unsecured area of the network or is placed in the ____ zone.
    a. fully trusted c. demilitarized
    b. hot d. cold
A

c. demilitarized

39
Q
  1. The ____ is an intermediate area between a trusted network and an untrusted network.
    a. perimeter c. domain
    b. DMZ d. firewall
A

b. DMZ

40
Q
  1. ____ firewalls are designed to operate at the media access control sublayer of the data link layer of the OSI network model.
    a. MAC layer c. Application gateways
    b. Circuit gateway d. Packet filtering
A

a. MAC layer

41
Q
  1. In recent years, the broadband router devices that can function as packet-filtering firewalls have been enhanced to combine the features of ____.
    a. UDPs c. WANs
    b. MACs d. WAPs
A

d. WAPs

42
Q
  1. Since the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the ____ host.
    a. trusted c. single
    b. domain d. sacrificial
A

d. sacrificial

43
Q
  1. The dominant architecture used to secure network access today is the ____ firewall.
    a. static c. unlimited
    b. bastion d. screened subnet
A

d. screened subnet

44
Q
  1. ____ is the protocol for handling TCP traffic through a proxy server.
    a. SOCKS c. FTP
    b. HTTPS d. Telnet
A

a. SOCKS

45
Q
  1. Telnet protocol packets usually go to TCP port ____.
    a. 7 c. 14
    b. 8 d. 23
A

d. 23

46
Q
  1. ICMP uses port ____ to request a response to a query and can be the first indicator of a malicious attack.
    a. 4 c. 8
    b. 7 d. 48
A

b. 7

47
Q
  1. In most common implementation models, the content filter has two components: ____.
    a. encryption and decryption c. rating and decryption
    b. filtering and encoding d. rating and filtering
A

d. rating and filtering

48
Q
  1. ____ and TACACS are systems that authenticate the credentials of users who are trying to access an organization’s network via a dial-up connection.
    a. RADIUS c. TUNMAN
    b. RADIAL d. IPSEC
A

a. RADIUS

49
Q
  1. Which of the following is a valid version of TACACS?
    a. TACACS c. TACACS+
    b. Extended TACACS d. All of the above
A

d. All of the above

50
Q
  1. ____ generates and issues session keys in Kerberos.
    a. VPN c. AS
    b. KDC d. TGS
A

b. KDC

51
Q
  1. Kerberos ____ provides tickets to clients who request services.
    a. KDS c. AS
    b. TGS d. VPN
A

b. TGS

52
Q
  1. In SESAME, the user is first authenticated to an authentication server and receives a token. The token is then presented to a privilege attribute server as proof of identity to gain a(n) ____.
    a. VPN c. ticket
    b. ECMA d. PAC
A

d. PAC

53
Q
  1. A(n) ____ is “a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.”
    a. SVPN c. SESAME
    b. VPN d. KERBES
A

b. VPN

54
Q
  1. In ____ mode, the data within an IP packet is encrypted, but the header information is not.
    a. tunnel c. public
    b. transport d. symmetric
A

b. transport

55
Q
  1. ISA Server can use ____ technology.
    a. PNP c. RAS
    b. Point to Point Tunneling Protocol d. All of the above
A

b. Point to Point Tunneling Protocol