Firewall Security

28 Questions

Settings
Please wait...
Firewall Security

Multiple choice questions about routers. Good luck.


Questions and Answers
  • 1. 
    A firewall needs to be ____ so that it can grow with the network it protects.
    • A. 

      Robust

    • B. 

      Expensive

    • C. 

      Fast

    • D. 

      Scalable

  • 2. 
    A(n) ____ is a fancy term for a computer that has two network interfaces.
    • A. 

      Proxy gateway

    • B. 

      Duel-homed host

    • C. 

      Routing workstation

    • D. 

      NAT server

  • 3. 
    A(n) ____ host is sometimes called a dual-homed gateway or bastion host.
    • A. 

      Proxy

    • B. 

      Stub

    • C. 

      Sceened

    • D. 

      Blocked

  • 4. 
    The ____ server in the DMZ needs only list a limited number of public IP addresses.
    • A. 

      DNS

    • B. 

      NAT

    • C. 

      Proxy

    • D. 

      Firewall

  • 5. 
    A(n) ____ server is a server that creates a secure tunnel connection.
    • A. 

      RADIUS

    • B. 

      VPN

    • C. 

      Tunnel

    • D. 

      Authentication

  • 6. 
    • A. 

      You can control where traffic goes in the three networks

    • B. 

      You can do stateful packet filtering

    • C. 

      You can do load balancing

    • D. 

      Improved network performance

  • 7. 
    A system that monitors traffic into and out of a network and automatically alerts personnel when suspicious traffic patterns occur, indicating a possible unauthorized intrusion attempt is called a(n) __________________.
    • A. 

      IDS

    • B. 

      Firewall

    • C. 

      Router

    • D. 

      Anit-virus software

  • 8. 
    In an IP packet header, the ____ is the address of the computer or device that is to receive the packet.
    • A. 

      Source address

    • B. 

      Flag

    • C. 

      Destination address

    • D. 

      Total length

  • 9. 
    In an IP packet header, the ____ describes the length of the header in 32-bit words and is a 4-bit value.
    • A. 

      Internet header length

    • B. 

      Fragment offset

    • C. 

      Total length

    • D. 

      Header checksum

  • 10. 
    What tells a firewall how to reassemble a data stream that has been divided into packets?
    • A. 

      The source routing feature

    • B. 

      The number in the header's identification field

    • C. 

      The destination IP address

    • D. 

      The header checksum field in the packet header

  • 11. 
    What is the most effective security approach for a stateless packet filter?
    • A. 

      Deny all except specified hosts

    • B. 

      Allow all except specified hosts

    • C. 

      Allow access to only specified destination servers

    • D. 

      Deny access to all destinations except specified servers

  • 12. 
    What TCP port is used by Telnet?
    • A. 

      80

    • B. 

      110

    • C. 

      23

    • D. 

      72

  • 13. 
    What TCP port is used to filter out Web traffic?
    • A. 

      25

    • B. 

      21

    • C. 

      23

    • D. 

      80

  • 14. 
    Some ____ firewalls are able to examine the contents of packets as well as the headers for signs that they are legitimate.
    • A. 

      Boundary

    • B. 

      Stateful

    • C. 

      Stateless

    • D. 

      Personal

  • 15. 
    What is the most common command to use ICMP?
    • A. 

      Ping

    • B. 

      Trace

    • C. 

      Netstat

    • D. 

      NBTstat

  • 16. 
    What port does secure HTTP use?
    • A. 

      8080

    • B. 

      224

    • C. 

      442

    • D. 

      443

  • 17. 
    What port does DNS use for connection attempts?
    • A. 

      68

    • B. 

      21

    • C. 

      53

    • D. 

      56

  • 18. 
    FTP uses port ____ for the control port.
    • A. 

      20

    • B. 

      21

    • C. 

      22

    • D. 

      23

  • 19. 
    • A. 

      Bits

    • B. 

      Segments

    • C. 

      Frames

    • D. 

      Packets

  • 20. 
    A datagram is called ______ at the network layer of OSI.
    • A. 

      Bits

    • B. 

      Segments

    • C. 

      Frames

    • D. 

      Packets

  • 21. 
    A ________-level proxy provides protection at the session layer of OSI.
    • A. 

      Application

    • B. 

      Circuit

    • C. 

      Proxy

    • D. 

      Server

  • 22. 
    Ports up to _______ are called well-known ports.
    • A. 

      1500

    • B. 

      255

    • C. 

      1023

    • D. 

      1025

  • 23. 
    A stateful firewall maintains a ___________, which is a list of active connections.
    • A. 

      Routing table

    • B. 

      Bridging table

    • C. 

      State table

    • D. 

      Connection table

  • 24. 
    _______________ is an error-checking procedure performed in the trailer section of an IP packet.
    • A. 

      CRC

    • B. 

      ACK

    • C. 

      FQDN

    • D. 

      FIN

  • 25. 
    This 8-bit value identifies the maximum time the packet can remain in the system before it is dropped.
    • A. 

      Fragment

    • B. 

      Time to live

    • C. 

      Protocol

    • D. 

      Checksum

  • 26. 
    Zone Alarm is an example of a ________ firewall.
    • A. 

      Personal

    • B. 

      Corporate

    • C. 

      IDS

    • D. 

      None of the above

  • 27. 
    ___________ is another term for a packet of digital information.
    • A. 

      Footer

    • B. 

      Header

    • C. 

      Data

    • D. 

      Datagram

  • 28. 
    The practice of designing operational aspects of a system to work with a minimal amount of system privilege is called _____________.
    • A. 

      Least privilege

    • B. 

      Failover firewall

    • C. 

      IP forwarding

    • D. 

      Access denied