networking2 Flashcards
(39 cards)
Linux stores passwords in the ____ file in encrypted format.
a. /etc/pass c. /etc/passwd
b. /root/passwd d. /system/password
/etc/passwd
Public-Key Infrastructure (PKI) must be used for ____ authentication.
a. Kerberos c. RADIUS
b. 802.1x Wi-Fi d. certificate-based
certificate-based
In ____________________-based access controls, access is granted based on a set of rules specified by the central authority.
ANS: rule
___________ is the act of confirming the identity of a potential user.
ANS: Authentication
With ____________________ authentication, the firewall enables the authenticated user to access the desired resources for a specific period of time.
ANS: client
____________________ IP address mappings work best because some TACACS+ systems use the source IP address to create the encryption key.
ANS: Static
The ____________________ password system, which is a feature of the Linux operating system that enables the secure storage of passwords, stores them in another file that has restricted access.
ANS: shadow
MATCHING CHAPTER 3
A firewall is designed to prevent all attackers, viruses, and would-be intruders from entering a computer or computer network. T/F
F
Mobile devices such as laptops, PDAs, and smartphones blur the perimeter boundary. T/F
T
A properly configured firewall only allows authorized connection attempts to the ports on the network it protects.
T/F
T
A packet-filtering firewall installed on a TCP/IP-based network typically functions at the TCP level. T/F
F
Application-layer gateways can control the way applications inside the network access external networks by setting up proxy services. T/F
T
Firewalls provide ____ services by examining packet headers and allowing traffic that conforms to estalished rules to continue.
a. packet filtering c. application proxy
b. NAT d. TCP/IP
a. packet filtering
Firewalls can be used to host ____ to reduce server load and improve Web-site performance.
a. logging c. VPN
b. shielding hosts d. cached data
d. cached data
A firewall may also help prevent some Trojan horses from leveraging the local network through unauthorized service ports called ____.
a. back doors c. perimeters
b. apPlication proxies d. content locks
a. back doors
Network perimeters may be blurred by ____.
a. VPNs c. Web sites
b. intranets d. desktop computers
a. VPNs
A ____ firewall enables you to log passing traffic, protecting the whole network at one time.
a. stateful c. perimeter
b. stateless d. DMZ
c. perimeter
A network that needs to connect to the Internet might have a ____ host and a service network.
a. walled c. packet
b. mail d. bastion
d. bastion
Ports numbers range from 0 to ____.
a. 1024 c. 65,535
b. 3999 d. 786,568
c. 65,535
The combination of a sender’s full address (network address plus port) and receiver’s address (network address plus port) makes up a ____.
a. socket c. bastion
b. packet d. DMZ
a. socket
A firewall can act as a(n) ____ server that makes high-level application connections on behalf of internal hosts and other machines.
a. proxy c. HTTP
b. forward d. outbound
a. proxy
____ are commonly used to connect two companies networks over the Internet in a site-to-site configuration.
a. Bastion hosts c. Proxy servers
b. VPNs d. Stateful proxies
b. VPNs
In the OSI model, level 1 is the ____ layer.
a. physical c. transport
b. data link d. application
a. physical