IS3220 CHAPTER 10 Flashcards Preview

IS3220 NETWORK SECURITY, FIREWALLS, & VPNS > IS3220 CHAPTER 10 > Flashcards

Flashcards in IS3220 CHAPTER 10 Deck (25):
1

A form of threat that takes some type of initiative to seek out a target to compromise is called ___?
These can be hackers, intruders, or automated worms. These seek out vulnerable targets. If you don't have reasonable security measures and this discovers your system, you might be at risk for a compromise.

ACTIVE THREATS

2

This is a small text file used by Web browsers and servers to track Web sessions is called ___?
It blocks the sending and receiving of cookies. Blocking can reduce some threats of session tracking identify theft, but can also disable many Web-based services such as online purchasing.

COOKIE FILTER

3

A firewall within an operating system or hardware device placed there by the vendor or manufacturer is called ___?
Can also include firewalls not necessarily installed b default, but which you can add to a system through an update or patch installation is.

NATIVE FIREWALL

4

Any harmful code or site that depends upon the user's actions to be accessed or activated is called ___?
If users never visit an infected site or do not perform the risky activity, the threat never reaches them. It is similar to a virus in that it depends upon the activity of the user to activate, infect, and spread.

PASSIVE THREATS

5

A software tool that prevents or restricts Web sites from automatically opening additional tabs or windows without the user's consent is called ___?
These additional windows are commonly used as methods of advertising, as well as elements in social engineering and distribution of malicious code.

POP-UP BLOCKER

6

1. What types of internet threats are considered passive, in the sense that the user must seek them out to be harmed? (Select all that apply)

1. Malicious Web sites
2. Worms
3. Downloaded content
4. SPAM
5. Trojan Horse

Malicious Web sites

Downloaded content

Trojan Horse

7

2. Average home users and workers at a large corporation can both benefit from which of the following:

1. Open-source hardware firewall
2. Gateway server firewall
3. Commercial appliance firewall
4. Host firewall
5. Proprietary device firewall

Host firewall

8

3. What are the two locations that a home or SOHO user is likely to find a firewall by default? (Select all that apply)

1. A self-installed software firewall
2. Hosted by the operating system
3. A build-it yourself appliance firewall
4. Hosted by the ISP connection device
5. A commercial firewall device

Hosted by the operating system

Hosted by the ISP connection device

9

4. Windows operating systems are the only operating systems that include a native or default host firewall.
TRUE OR FALSE

FALSE

10

5. What is the maximum number of host software firewalls that should be operating on a single computer at any point in time?

1. One
2. Two
3. Three
4. Four
5. None

One

11

6. Firewalls are design to provide protection for both ___ and ___ communications.

inbound
outbound

12

7. An organization should consider purchasing last year's model firewall instead of this year if they receive a significant discount.
TRUE OR FALSE

FALSE

13

8. When considering the deployment of a firewall, which of the following should be considered?

1. Commercial firewalls
2. Legacy firewalls
3. Open-source firewalls
4. Beta firewalls
5. Do-it-yourself (IY) firewalls

Commercial firewalls

Open-source firewalls

Do-it-yourself (IY) firewalls

14

9. The Window 7 firewall includes a new easy-to-configure feature that allows file and printer sharing between systems authorized by a password. This feature no longer encourages users to just turn off the whole firewall rather than figure out how to properly configure file and printer sharing access rules. What is this feature called?

1. Internet connection sharing
2. Quick config
3. Homegroup
4. Shared computing
5. Microsoft Easy Access Firewall

Homegroup

15

10. What is the command line tool used to configure the Windows 7 firewall?

1. route firewall
2. netsh advfirewall firewall
3. new use firewall
4. firewall config
5. netsh firewall

netsh advfirewall firewall

16

11. Using a Linus software firewall as a replacement for commercial firewall appliance can be a very cost-effective solution. Linus often can repurpose computer hardware that is no longer sufficient to support larger, bulkier, more resource-intensive operating systems.
TRUE OR FALSE

TRUE

17

12. The firewall configuration on an ISP connection device is most commonly access through what type of management interface?

1. SMTP
2. HTTP/HTTPS
3. SSH
4. FTP
5. RSH

HTTP/HTTPS

18

13. If your ISP refuses to grant access to configure their connection device, what legal options are available to you as alternatives? (Select all that apply)

1. Live without configuring it
2. Hack into it
3. Deploy your own hardware firewall alternative
4. Purchase your own connection device
5. Change ISPs

Live without configuring it

Deploy your own hardware firewall alternative

Purchase your own connection device

Change ISPs

19

14. What is the command line utility used to display the IP configuration of your Windows computer?

1. ifconfig
2. net use network
3. netconfig
4. ipconfig
5. netstat

ipconfig

20

15. When configuring a wireless access point to provide firewall services, which of the following are important configuration actions to take? (Select all that apply)

1. Change the default administrator password
2. Block unwanted ports
3. Change the SSID
4. Turn off SSID broadcasting
5. Change the default IP address range

Change the default administrator password
Block unwanted ports
Change the SSID
Turn off SSID broadcasting
Change the default IP address range

ALL

21

16. In general, you should not accept any connections that originate from ___ your firewall.

outside

22

17. If your home firewall device is unable to block ports, use ___ instead to rout data to nonexistent hosts.

post forwarding

23

18. It is best to pick a firewall based on:

1. Actual network security needs
2. Recommendations of a salesperson
3. The list of awards given the product
4. The price
5. Prominent advertisement

Actual network security needs

24

19. Appliance firewalls are only and always commercial firewalls.
TRUE OR FALSE

FALSE

25

20. When selecting a firewall, especially a hardware firewall, never skimp on ____.

throughput