Filters
Question type

Study Flashcards

Describe a firewall policy for application traffic.

Correct Answer

verifed

verified

A firewall policy is an addition to the ...

View Answer

What is a cleanup rule? Provide an example.

Correct Answer

verifed

verified

A cleanup rule handles any other packets...

View Answer

Which of the following is a method for supporting IPv6 on IPv4 networks until IPv6 is universally adopted?


A) Teredo tunneling
B) ICMPv6 encapsulation
C) IPsec tunneling
D) SMTP/S tunneling

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

ACLs filter packets by using a __________ base to determine whether to allow a packet to pass.

Correct Answer

verifed

verified

rule

What should a company concerned about protecting its data warehouses and employee privacy might consider installing on the network perimeter to prevent direct connections between the internal network and the Internet?


A) router
B) VPN server
C) ICMP monitor
D) proxy server

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

D

A firewall can consist of all devices positioned on the network _____________.

Correct Answer

verifed

verified

Software firewalls are usually more scalable than hardware firewalls.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is a general practice for a rule base?


A) begin by blocking all traffic and end by allowing selective services
B) permit access to public servers in the DMZ
C) allow all access to the firewall
D) allow direct access from the Internet to computers behind the firewall

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

MATCHING -hardware or software configured to block unauthorized access to a network


A) cleanup rule
B) firewall
C) firewall appliance
D) firewall policy
E) proxy server
F) rule base
G) socket
H) state table
I) stateful packet filters
J) stateless packet filters

K) None of the above
L) D) and H)

Correct Answer

verifed

verified

B

MATCHING -a packet-filtering rule that comes last in a rule base and covers any packets that have not been covered by preceding rules


A) cleanup rule
B) firewall
C) firewall appliance
D) firewall policy
E) proxy server
F) rule base
G) socket
H) state table
I) stateful packet filters
J) stateless packet filters

K) A) and C)
L) D) and F)

Correct Answer

verifed

verified

What service uses UDP port 53?


A) SMTP
B) DNS
C) ICMP
D) TFTP

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Which of the following is an advantage of hardware firewalls?


A) not scalable compared to software firewalls
B) not dependent on a conventional OS
C) less expensive than software firewalls
D) easy to patch

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Which two ports should packet-filtering rules address when establishing rules for Web access?


A) 143, 80
B) 25, 110
C) 80, 443
D) 423, 88

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Generally,connections to instant-messaging ports are harmless and should be allowed.

A) True
B) False

Correct Answer

verifed

verified

A primary objective of a rule base is to ______________ communications based on complex rules.

Correct Answer

verifed

verified

What makes an effective rule base? List three points to consider.

Correct Answer

verifed

verified

It should be based on the organization's...

View Answer

MATCHING -software that forwards network packets and caches Web pages to speed up network performance


A) cleanup rule
B) firewall
C) firewall appliance
D) firewall policy
E) proxy server
F) rule base
G) socket
H) state table
I) stateful packet filters
J) stateless packet filters

K) A) and E)
L) A) and I)

Correct Answer

verifed

verified

Which of the following is a typical drawback of a free firewall program?


A) cannot monitor traffic in real time
B) oversimplified configuration
C) have centralized management
D) more expensive than hardware firewalls

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

What is considered the 'cleanup rule' on a Cisco router?


A) explicit allow all
B) implicit deny all
C) explicit prompt
D) implicit allow

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Firewalls can protect against employees copying confidential data from within the network.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer