480 Chapter 9

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is an advantage of using a hardware firewall rather than a software firewall? (Choose all that apply) A. Scalability B. Cost D. Ease of maintenance D. Increased throughput

A. Scalability D. Increased throughput

The Windows RPC service works like the UNIX ____ service. a. Mountd B. Portmapper c. QOTD D. INFS

B. Portmapper

Stateless packet filters are more secure than stateful packet filters because they do not contain a state table that can be exploited by an attacker. True or False?

False

When you request a web page, which port does the web server use to send you the page? A. 80 B. 443 C. One higher than 1023 D. One lower than 1023

A. 80

Stateless packet filters allow or block packets based on which of the following? A. Status of the connection B. Information in protocol headers C. State table D. Packets that have been handled previously

B. Information in protocol headers

Which port is used for name/address resolution? A. 20 B. 53 C. 80 D. 110

B. 53

A firewall policy does which of the following? (choose all that apply) A. Describes how employees can use the firewall B. Identifies and mitigates risks C. Explains how the firewall is set up, managed, and updated D. Specifics on how the firewall should handle application traffic

B. Identifies and mitigates risks C. Explains how the firewall is set up, managed, and updated D. Specifics on how the firewall should handle application traffic

Which of the following is a guideline for developing a firewall rule base? (Choose all that apply.) A. The rule base should restrict all Internet access B. The rule base should restrict access to ports and subnets on the internal network from the Internet C. The rule base should be as detailed as possible D. The rule base should not interfere with application traffic

B. The rule base should restrict access to ports and subnets on the internal network from the Internet D. The rule base should not interfere with application traffic

A rule base should end with a(n) _____ rule. A. Reject B. Allow C. Cleanup D. Block

C. Cleanup

Which of the following is an advantage of using a software firewall rather than a hardware firewall? A. Throughput B. Reliability C. Cost D. Availability

C. Cost

A firewall can do which of the following? (Choose all that apply.) A. Screen traffic for viruses B. Determine what user is sending transmissions C. Filter traffic based on rules. D. Provide a layer of protection for the network

C. Filter traffic based on rules. D. Provide a layer of protection for the network

Almost every type of firewall depends on what configurable feature for its effectiveness? A. Network connection B. State Table C. Rule base D. Management console

C. Rule base

Where should you place the most important rules in a rule base? a. In the connection log file B. At the bottom of the rule base C. In the state table D. At the top of the rule base

D. At the top of the rule base

A socket is a combination of a(n) ____ and a(n) _____. A. NetBIOS name, port number B. Port number, MAC address C. MAC Address, IP address D. IP address, port number

D. IP address, port number

A firewall is an effective stand-alone security solution. True or False?

False


Conjuntos de estudio relacionados

Directional Terms Activity BIO 201

View Set

APUSH 1st Semester Final Exam Study Guide

View Set

FOI.6 Nucleus: Understand the storage of genetic information and how it is passed down to successive generations and the principles of basic techniques in Molecular Biology

View Set

CH. 11 (REVISED) IPC TEST REVIEW

View Set

Light Independent Reactions in Photosynthesis

View Set

Psyc Ch 12 Emotion Stress Health

View Set

Land Use, Controls, and Regulations

View Set