Flashcards in IS3220 CHAPTER 10 Deck (25):
A form of threat that takes some type of initiative to seek out a target to compromise is called ___?
These can be hackers, intruders, or automated worms. These seek out vulnerable targets. If you don't have reasonable security measures and this discovers your system, you might be at risk for a compromise.
This is a small text file used by Web browsers and servers to track Web sessions is called ___?
It blocks the sending and receiving of cookies. Blocking can reduce some threats of session tracking identify theft, but can also disable many Web-based services such as online purchasing.
A firewall within an operating system or hardware device placed there by the vendor or manufacturer is called ___?
Can also include firewalls not necessarily installed b default, but which you can add to a system through an update or patch installation is.
Any harmful code or site that depends upon the user's actions to be accessed or activated is called ___?
If users never visit an infected site or do not perform the risky activity, the threat never reaches them. It is similar to a virus in that it depends upon the activity of the user to activate, infect, and spread.
A software tool that prevents or restricts Web sites from automatically opening additional tabs or windows without the user's consent is called ___?
These additional windows are commonly used as methods of advertising, as well as elements in social engineering and distribution of malicious code.
1. What types of internet threats are considered passive, in the sense that the user must seek them out to be harmed? (Select all that apply)
1. Malicious Web sites
3. Downloaded content
5. Trojan Horse
Malicious Web sites
2. Average home users and workers at a large corporation can both benefit from which of the following:
1. Open-source hardware firewall
2. Gateway server firewall
3. Commercial appliance firewall
4. Host firewall
5. Proprietary device firewall
3. What are the two locations that a home or SOHO user is likely to find a firewall by default? (Select all that apply)
1. A self-installed software firewall
2. Hosted by the operating system
3. A build-it yourself appliance firewall
4. Hosted by the ISP connection device
5. A commercial firewall device
Hosted by the operating system
Hosted by the ISP connection device
4. Windows operating systems are the only operating systems that include a native or default host firewall.
TRUE OR FALSE
5. What is the maximum number of host software firewalls that should be operating on a single computer at any point in time?
6. Firewalls are design to provide protection for both ___ and ___ communications.
7. An organization should consider purchasing last year's model firewall instead of this year if they receive a significant discount.
TRUE OR FALSE
8. When considering the deployment of a firewall, which of the following should be considered?
1. Commercial firewalls
2. Legacy firewalls
3. Open-source firewalls
4. Beta firewalls
5. Do-it-yourself (IY) firewalls
Do-it-yourself (IY) firewalls
9. The Window 7 firewall includes a new easy-to-configure feature that allows file and printer sharing between systems authorized by a password. This feature no longer encourages users to just turn off the whole firewall rather than figure out how to properly configure file and printer sharing access rules. What is this feature called?
1. Internet connection sharing
2. Quick config
4. Shared computing
5. Microsoft Easy Access Firewall
10. What is the command line tool used to configure the Windows 7 firewall?
1. route firewall
2. netsh advfirewall firewall
3. new use firewall
4. firewall config
5. netsh firewall
netsh advfirewall firewall
11. Using a Linus software firewall as a replacement for commercial firewall appliance can be a very cost-effective solution. Linus often can repurpose computer hardware that is no longer sufficient to support larger, bulkier, more resource-intensive operating systems.
TRUE OR FALSE
12. The firewall configuration on an ISP connection device is most commonly access through what type of management interface?
13. If your ISP refuses to grant access to configure their connection device, what legal options are available to you as alternatives? (Select all that apply)
1. Live without configuring it
2. Hack into it
3. Deploy your own hardware firewall alternative
4. Purchase your own connection device
5. Change ISPs
Live without configuring it
Deploy your own hardware firewall alternative
Purchase your own connection device
14. What is the command line utility used to display the IP configuration of your Windows computer?
2. net use network
15. When configuring a wireless access point to provide firewall services, which of the following are important configuration actions to take? (Select all that apply)
1. Change the default administrator password
2. Block unwanted ports
3. Change the SSID
4. Turn off SSID broadcasting
5. Change the default IP address range
Change the default administrator password
Block unwanted ports
Change the SSID
Turn off SSID broadcasting
Change the default IP address range
16. In general, you should not accept any connections that originate from ___ your firewall.
17. If your home firewall device is unable to block ports, use ___ instead to rout data to nonexistent hosts.
18. It is best to pick a firewall based on:
1. Actual network security needs
2. Recommendations of a salesperson
3. The list of awards given the product
4. The price
5. Prominent advertisement
Actual network security needs
19. Appliance firewalls are only and always commercial firewalls.
TRUE OR FALSE