Chapter 5 Quiz - Packet Filtering

¡Supera tus tareas y exámenes ahora con Quizwiz!

____ packet filters are useful for completely blocking traffic from a subnet or other network.

Stateless

It is good practice to block ____ access to all internal servers from the public networks.

Telnet

Enabling external hosts to connect to your public servers in the DMZ, but not to hosts in the internal LAN, is an example of filtering on the ____.

destination IP address

The header field that indicates whether the packet is a fragment is ____.

flags

The problem with fragmentation is that because the TCP or UDP port number is provided only at the beginning of a packet, it appears ____.

only in fragments numbered 0

The header field that can contain a security field, which enables the sender to assign a classification level to the packet is ____.

options

A stateless filter compares the header data against its ____ and forwards each packet as a rule is found to match the specifics of that packet.

rule base

One of the first IP header criteria you can filter on is the packet's ____.

source IP address

An 8-bit value is between

00000001 and 11111111

Packets requesting a connection have the ACK bit set to 0; those that are part of an ongoing connection have the ACK bit set to ____.

1

Telnet is most often assigned to use port ____.

23

ICMP message type ____ indicates that a faster route has been located.

5

Using TCP or UDP port numbers can help you filter a wide variety of information, including SMTP and POP e-mail messages, NetBIOS sessions, ____, and Network News Transfer Protocol (NNTP) newsgroup sessions.

DNS requests

The ____ is a structure for organizing Internet names associated with IP

Domain Name System (DNS)

A stateless or stateful packet filter that supports active ____ must allow all traffic coming from TCP Port 20 as well as outbound traffic coming from ports above 1023.

FTP

____ are stand-alone hardware devices with self-contained components that are purpose built to filter out network traffic that does not conform to established rules.

Firewall appliances

____ indicate whether a large number of echo messages are being received.

Firewall logs

The ____ describes the length of the packet header in 32-bit words and is a 4 bit value.

Internet header length

TCP/IP includes ____ which are small manageable chucks of network data.

Packets

The ____ flag tells a host to immediately terminate a connection.

RST


Conjuntos de estudio relacionados

AP Gov Unit 2 : Interaction among the Branches of Government

View Set

Toxicology - Chapter 3 Biotransformation

View Set

Postulates and Theorems related to parallel and perpendicular lines

View Set

Chapter 28. The Female Reproductive System (Sections 1-4) Homework Assignment

View Set

Art Appreciation InQuizitive 2.7 - Visual Communication Design

View Set

Psychology - 2. Psychology Research

View Set

Chp 14- Gene Expression at the Molecular Level III: Gene Regulation

View Set