Network Firewalls Quiz Questions

45 Questions

Settings
Please wait...
Firewall Quizzes & Trivia

IS Practice 2 practice


Questions and Answers
  • 1. 
    A(n) ____ is “a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.”
    • A. 

      SESAME

    • B. 

      SVPN

    • C. 

      VPN

    • D. 

      KERBES

  • 2. 
      In SESAME, the user is first authenticated to an authentication server and receives a token. The token is then presented to a privilege attribute server as proof of identity to gain a(n) ____.
    • A. 

      Ticket

    • B. 

      PAC

    • C. 

      VPN

    • D. 

      ECMA

  • 3. 
    ____ generates and issues session keys in Kerberos.
    • A. 

      TGS

    • B. 

      VPN

    • C. 

      KDC

    • D. 

      AS

  • 4. 
      ____ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.
    • A. 

      Packet filtering

    • B. 

      Circuit gateways

    • C. 

      Application gateways

    • D. 

      MAC layer firewalls

  • 5. 
    ICMP uses port ____ to request a response to a query and can be the first indicator of a malicious attack.
    • A. 

      7

    • B. 

      48

    • C. 

      8

    • D. 

      4

  • 6. 
    Telnet protocol packets usually go to TCP port ____.
    • A. 

      23

    • B. 

      14

    • C. 

      8

    • D. 

      7

  • 7. 
    The dominant architecture used to secure network access today in large organizations is the ____ firewall.
    • A. 

      Bastion

    • B. 

      Unlimited

    • C. 

      Static

    • D. 

      Screened subnet

  • 8. 
    ____ filtering allows the firewall to react to an emergent event and update or create rules to deal with the event.
    • A. 

      Stateful

    • B. 

      Stateless

    • C. 

      Static

    • D. 

      Dynamic

  • 9. 
    ____ firewalls keep track of each network connection between internal and external systems.
    • A. 

      Stateless

    • B. 

      Static

    • C. 

      Stateful

    • D. 

      Dynamic

  • 10. 
    The proxy server is often placed in an unsecured area of the network or is placed in the ____ zone.
    • A. 

      Cold

    • B. 

      Fully trusted

    • C. 

      Hot

    • D. 

      Demilitarized

  • 11. 
    A(n) ____ works like a burglar alarm in that it detects a violation of its configuration (analogous to an opened or broken window) and activates an alarm.
    • A. 

      ITS

    • B. 

      IIS

    • C. 

      SIS

    • D. 

      IDS

  • 12. 
    Using ____, the system reviews the log files generated by servers, network devices, and even other IDPSs.
    • A. 

      LFM

    • B. 

      Stat IDPS

    • C. 

      AppIDPS

    • D. 

      HIDPS

  • 13. 
    ____ are decoy systems designed to lure potential attackers away from critical systems and encourage attacks against themselves.
    • A. 

      Honey cells

    • B. 

      Padded cells

    • C. 

      Padded nets

    • D. 

      Honey pots

  • 14. 
    ____ is the action of luring an individual into committing a crime to get a conviction.
    • A. 

      Padding

    • B. 

      Intrusion

    • C. 

      Enticement

    • D. 

      Entrapment

  • 15. 
    A(n) ____ is a network tool that collects copies of packets from the network and analyzes them.
    • A. 

      Honey pot

    • B. 

      Packet scanner

    • C. 

      Honey packet

    • D. 

      Packet sniffer

  • 16. 
    • A. 

      Handprint recognition

    • B. 

      Retina pattern recognition

    • C. 

      Signature recognition

    • D. 

      Voice recognition

  • 17. 
    A(n) ____ IDPS is focused on protecting network information assets.
    • A. 

      Network-based

    • B. 

      Server-based

    • C. 

      Application-based

    • D. 

      Host-based

  • 18. 
    ____ is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device
    • A. 

      NIDPS

    • B. 

      IDSE

    • C. 

      SPAN

    • D. 

      DPS

  • 19. 
    NIDPSs must look for attack patterns by comparing measured activity to known ____ in their knowledge base.
    • A. 

      Fingerprints

    • B. 

      Signatures

    • C. 

      Footprints

    • D. 

      Fingernails

  • 20. 
    ____ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.
    • A. 

      AppIDPSs

    • B. 

      SIDPSs

    • C. 

      HIDPSs

    • D. 

      NIDPSs

  • 21. 
    ____ sensors project and detect an infrared beam across an area.
    • A. 

      Thermal

    • B. 

      Air-aspirating

    • C. 

      Photoelectric

    • D. 

      Smoke

  • 22. 
    Class ____ fires are extinguished by agents that remove oxygen from the fire.
    • A. 

      C

    • B. 

      A

    • C. 

      B

    • D. 

      D

  • 23. 
    Class ____ fires are extinguished with agents that must be non-conducting.
    • A. 

      A

    • B. 

      B

    • C. 

      D

    • D. 

      C

  • 24. 
    ____ sprinklers are the newest form of sprinkler systems and rely on ultra fine mists instead of traditional shower-type systems.
    • A. 

      Air-dry

    • B. 

      Pre-action

    • C. 

      Water-free

    • D. 

      Water mist

  • 25. 
    One of the leading causes of damage to sensitive circuitry is ____.
    • A. 

      HVAC

    • B. 

      ESD

    • C. 

      EPA

    • D. 

      CPU

  • 26. 
    ____ occurs when an authorized individual presents a key to open a door, and other individuals, who may or may not be authorized, also enter through.
    • A. 

      Sidegating

    • B. 

      Hitchhiking

    • C. 

      Tailgating

    • D. 

      Freeloading

  • 27. 
    The most sophisticated locks are ____.
    • A. 

      Electronic

    • B. 

      Manual

    • C. 

      Programmable

    • D. 

      Biometric

  • 28. 
    Electronic monitoring includes ____ systems.
    • A. 

      Local video

    • B. 

      Closed-circuit television

    • C. 

      Open-circuit television

    • D. 

      Blocked video

  • 29. 
    ____ sensors work when two contacts are connected as, for example, when a foot steps on a pressure-sensitive pad under a rug, or a window being opened triggers a pin and spring sensor.
    • A. 

      Pressure

    • B. 

      Contact and weight

    • C. 

      Motion

    • D. 

      Movement

  • 30. 
    The interior walls reach only part way to the next floor, which leaves a space above the ceiling of the offices but below the top of the storey. This space is called a(n) ____.
    • A. 

      Attic

    • B. 

      Padding

    • C. 

      Plenum

    • D. 

      Kneespace

  • 31. 
    ____ is the requirement that every employee be able to perform the work of another employee.
    • A. 

      Duty exchange

    • B. 

      Collusion

    • C. 

      Task rotation

    • D. 

      Two-man control

  • 32. 
    ____ is a cornerstone in the protection of information assets and in the prevention of financial loss.
    • A. 

      Collusion

    • B. 

      Separation of duties

    • C. 

      Fire protection

    • D. 

      Business separation

  • 33. 
    The information security function can be placed within ____.
    • A. 

      Administrative services function

    • B. 

      Insurance and risk management function

    • C. 

      All of the above

    • D. 

      Legal department

  • 34. 
    Many organizations use a(n) ____ interview to remind the employee of contractual obligations, such as nondisclosure agreements, and to obtain feedback on the employee’s tenure in the organization.
    • A. 

      Hostile

    • B. 

      Departure

    • C. 

      Exit

    • D. 

      Termination

  • 35. 
    ____ are the technically qualified individuals tasked to configure firewalls, deploy IDSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that an organization’s security technology is properly implemented.
    • A. 

      Security technicians

    • B. 

      CSOs

    • C. 

      Security managers

    • D. 

      CISOs

  • 36. 
    ____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.
    • A. 

      Decryption

    • B. 

      Cryptology

    • C. 

      Cryptography

    • D. 

      Encryption

  • 37. 
    DES uses a(n) _____-bit block size.
    • A. 

      32

    • B. 

      64

    • C. 

      128

    • D. 

      256

  • 38. 
    ____ is a Federal Information Processing Standard that specifies a cryptographic algorithm that is used within the U.S. government to protect information at federal agencies that are not a part of the national defense infrastructure.
    • A. 

      AES

    • B. 

      DES

    • C. 

      3DES

    • D. 

      2DES

  • 39. 
    The CA periodically distributes a(n) ____ to all users that identifies all revoked certificates.
    • A. 

      MAC

    • B. 

      RA

    • C. 

      CRL

    • D. 

      AES

  • 40. 
    ____ is the entire range of values that can possibly be used to construct an individual key.
    • A. 

      Code

    • B. 

      Algorithm

    • C. 

      Keyspace

    • D. 

      Cryptogram

  • 41. 
    ____ is a hybrid cryptosystem originally designed in 1991 by Phil Zimmermann.
    • A. 

      DES

    • B. 

      PGP

    • C. 

      AH

    • D. 

      ESP

  • 42. 
    ____ is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext.
    • A. 

      Password

    • B. 

      Cipher

    • C. 

      Key

    • D. 

      Passphrase

  • 43. 
    ____ is the amount of effort (usually in hours) required to perform cryptanalysis on an encoded message so that it may be decrypted when the key or algorithm (or both) are unknown.
    • A. 

      Key

    • B. 

      Work factor

    • C. 

      Algorithm

    • D. 

      Code

  • 44. 
    ____ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.
    • A. 

      Key

    • B. 

      Map

    • C. 

      Hash

    • D. 

      Encryption

  • 45. 
    The ____ is essentially a one-way hash value that is encrypted with a symmetric key.
    • A. 

      Digest

    • B. 

      Fingerprint

    • C. 

      Signature

    • D. 

      MAC