Network Firewalls Quiz Questions

45 Questions | Total Attempts: 356

SettingsSettingsSettings
Please wait...
Firewall Quizzes & Trivia

IS Practice 2 practice


Questions and Answers
  • 1. 
    A(n) ____ is “a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.”
    • A. 

      SESAME

    • B. 

      SVPN

    • C. 

      VPN

    • D. 

      KERBES

  • 2. 
      In SESAME, the user is first authenticated to an authentication server and receives a token. The token is then presented to a privilege attribute server as proof of identity to gain a(n) ____.
    • A. 

      Ticket

    • B. 

      PAC

    • C. 

      VPN

    • D. 

      ECMA

  • 3. 
    ____ generates and issues session keys in Kerberos.
    • A. 

      TGS

    • B. 

      VPN

    • C. 

      KDC

    • D. 

      AS

  • 4. 
      ____ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.
    • A. 

      Packet filtering

    • B. 

      Circuit gateways

    • C. 

      Application gateways

    • D. 

      MAC layer firewalls

  • 5. 
    ICMP uses port ____ to request a response to a query and can be the first indicator of a malicious attack.
    • A. 

      7

    • B. 

      48

    • C. 

      8

    • D. 

      4

  • 6. 
    Telnet protocol packets usually go to TCP port ____.
    • A. 

      23

    • B. 

      14

    • C. 

      8

    • D. 

      7

  • 7. 
    The dominant architecture used to secure network access today in large organizations is the ____ firewall.
    • A. 

      Bastion

    • B. 

      Unlimited

    • C. 

      Static

    • D. 

      Screened subnet

  • 8. 
    ____ filtering allows the firewall to react to an emergent event and update or create rules to deal with the event.
    • A. 

      Stateful

    • B. 

      Stateless

    • C. 

      Static

    • D. 

      Dynamic

  • 9. 
    ____ firewalls keep track of each network connection between internal and external systems.
    • A. 

      Stateless

    • B. 

      Static

    • C. 

      Stateful

    • D. 

      Dynamic

  • 10. 
    The proxy server is often placed in an unsecured area of the network or is placed in the ____ zone.
    • A. 

      Cold

    • B. 

      Fully trusted

    • C. 

      Hot

    • D. 

      Demilitarized

  • 11. 
    A(n) ____ works like a burglar alarm in that it detects a violation of its configuration (analogous to an opened or broken window) and activates an alarm.
    • A. 

      ITS

    • B. 

      IIS

    • C. 

      SIS

    • D. 

      IDS

  • 12. 
    Using ____, the system reviews the log files generated by servers, network devices, and even other IDPSs.
    • A. 

      LFM

    • B. 

      Stat IDPS

    • C. 

      AppIDPS

    • D. 

      HIDPS

  • 13. 
    ____ are decoy systems designed to lure potential attackers away from critical systems and encourage attacks against themselves.
    • A. 

      Honey cells

    • B. 

      Padded cells

    • C. 

      Padded nets

    • D. 

      Honey pots

  • 14. 
    ____ is the action of luring an individual into committing a crime to get a conviction.
    • A. 

      Padding

    • B. 

      Intrusion

    • C. 

      Enticement

    • D. 

      Entrapment

  • 15. 
    A(n) ____ is a network tool that collects copies of packets from the network and analyzes them.
    • A. 

      Honey pot

    • B. 

      Packet scanner

    • C. 

      Honey packet

    • D. 

      Packet sniffer

  • 16. 
    Which of the following is the most secure Biometric Authentication system?
    • A. 

      Handprint recognition

    • B. 

      Retina pattern recognition

    • C. 

      Signature recognition

    • D. 

      Voice recognition

  • 17. 
    A(n) ____ IDPS is focused on protecting network information assets.
    • A. 

      Network-based

    • B. 

      Server-based

    • C. 

      Application-based

    • D. 

      Host-based

  • 18. 
    ____ is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device
    • A. 

      NIDPS

    • B. 

      IDSE

    • C. 

      SPAN

    • D. 

      DPS

  • 19. 
    NIDPSs must look for attack patterns by comparing measured activity to known ____ in their knowledge base.
    • A. 

      Fingerprints

    • B. 

      Signatures

    • C. 

      Footprints

    • D. 

      Fingernails

  • 20. 
    ____ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.
    • A. 

      AppIDPSs

    • B. 

      SIDPSs

    • C. 

      HIDPSs

    • D. 

      NIDPSs

  • 21. 
    ____ sensors project and detect an infrared beam across an area.
    • A. 

      Thermal

    • B. 

      Air-aspirating

    • C. 

      Photoelectric

    • D. 

      Smoke

  • 22. 
    Class ____ fires are extinguished by agents that remove oxygen from the fire.
    • A. 

      C

    • B. 

      A

    • C. 

      B

    • D. 

      D

  • 23. 
    Class ____ fires are extinguished with agents that must be non-conducting.
    • A. 

      A

    • B. 

      B

    • C. 

      D

    • D. 

      C

  • 24. 
    ____ sprinklers are the newest form of sprinkler systems and rely on ultra fine mists instead of traditional shower-type systems.
    • A. 

      Air-dry

    • B. 

      Pre-action

    • C. 

      Water-free

    • D. 

      Water mist

  • 25. 
    One of the leading causes of damage to sensitive circuitry is ____.
    • A. 

      HVAC

    • B. 

      ESD

    • C. 

      EPA

    • D. 

      CPU

Back to Top Back to top