Chapter 5 - Network Security Firewalls & VPNS

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When setting up port forwarding on an external firewall to pass HTTP traffic from the Internet to an internal web server, the external address and port are 204.40.235.38:8081. What is the internal IP address and port, assuming the most common port for that protocol?

192.168.5.74:80

While the design of a hardware firewall requires it to filter all inbound and outbound traffic, it can also act as a bottleneck for that traffic if the wire speed it filters at is too slow. For a 1 gigabits per second (Gbps) network, what filtering wire speed should the firewall possess?

2 Gbps or higher

Passive threats are those you must act upon to be harmed, such as clicking a link and downloading infected content. An active threat, such as a hacker, seeks out vulnerable targets. Which of the following is least effective against passive threats?

A door lock

Which of the following best describes a network chokepoint?

A specialized kind of gateway that focuses on traffic to a single concentrated pathway to streamline the process of filtering.

Charles is an IT help desk technician. He gets a ticket from a branch office saying that they lost Internet connectivity. He investigates remotely over a backup maintenance link and determines that this was done by design; the office's firewall deliberately severed the connection. Which of the following does this functionality define?

Bastion host

Augustine is a network engineer for a mid-sized company. He needs to deploy a new firewall, which was expensive to purchase and is complex to configure. In preparation for installation and configuration, he attends training conducted by the firewall vendor. Which of the following types of firewalls is he most likely planning to install?

Commercial

Rupesh is a network technician who has been tasked by his supervisor to configure the edge firewall of an office branch. His task is to focus on outbound traffic based on several factors, such as domain name, URL, file extension, and certain keywords. What is he configuring the firewall to perform?

Content filtering

Which of the following is a common firewall philosophy?

Deny by default

What prevents firewall filtering?

Encryption

A host software firewall should never be installed on a server if a dedicated firewall appliance is deployed on the same network.

False

A software firewall can protect multiple hosts from malicious network activity

False

Bump-in-the-wire is a software firewall implementation

False

One of the advantages of an off-the-shelf firewall versus a do-it-yourself firewall is lower cost

False

The sole use of ingress and egress filtering is to eliminate spoofing.

False

Malika is a network engineer who is configuring firewalls separating both the Accounting and HR departments from the rest of the business divisions on the local area network (LAN). She wants to allow only certain traffic into those subnets from both internal employees and those working from home. The traffic may include email, chat, and video conferencing. She wants to prevent access to the company intranets to protect confidential employee and financial data. How was she configured these firewalls?

Filter

Delmar is a consultant configuring a small firewall for a client who uses a small office/home office (SOHO) network. He is permitting the common protocols on the outbound connection, but he can only forward rather than block incoming protocols. If he forwards common protocols such as FTP, Telnet, and NetBIOS, how can this protect the network from anyone who may maliciously use these ports??

Forward to a nonexistent port where no device is listening

Hao is a network security engineer for a mid-sized company. She is redesigning the infrastructure and its resources to provide greater protection from both external and internal threats. She wants to place firewall devices not only where the local area network (LAN) connects to the Internet, but also within the network. Although she doesn't suspect any employees of misusing computer resources, there is always the potential that one might send unauthorized emails or other messages containing confidential company information to a competitor. Which redundant solution should she select that will be most likely to detect malicious behavior by an internal employee?

Host firewalls and firewalls at each subnet

Marcus is studying networking with an emphasis on cybersecurity at a local university. As part of his research, he wants to visit certain hacker sites but is concerned that his laptop would be vulnerable to passive threats while visiting them. He doesn't have the funds for expensive security equipment. What is the least expensive option he has at hand?

Native firewall

Jae is a network consultant hired by a small business client. He has been asked to recommend a firewall solution. Given the relatively small size of the infrastructure, he suggests a firewall that provides integrated intrusion detective system/intrusion prevention system (IDS/IPS) functionality because a single device offering multiple functions is cost- and space-effective. What is the solution?

Next-generation firewall (NGFW)

A firewall is a filtering device that watches for traffic that fails to comply with rules defined by the firewall administrator. What does the firewall inspect?

Packet Header

Geraldine is a freelance network technician. She has been hired to design and build a small office/home office (SOHO) network. She is considering what firewall solution to select, keeping in mind that her client has a tight budget and the network is made up of no more than six nodes. Which of the following is the best solution?

Personal hardware firewall integrated in the wireless access point or modem

Logan is a network administrator. He is considering a firewall purchase for a branch office being built by his company. Above all other considerations, the design requires a device capable of high degree of imposing user access restrictions. What is this called?

Privilege control

Manuela has researched a third-party software firewall she wants to install on her PC since she believes it is a better quality than the operating system's onboard firewall. She has read the installation instructions. The firewall is compatible with her operating system and has gotten good customer reviews. After performing the installation last week, she notices that numerous malicious exploits are successfully hacking her computer. What went wrong?

She forgot to disable the native firewall when she installed the third-party firewall.

Shamika is a networking student who has just moved into a small house with two other roommates. She has purchased a new DSL modem and is planning on configuring the built-in firewall. She needs to change the default username and password for the device first. What is her concern?

The default username and password are likely available on the Internet and anyone could use those credentials to hack into the modem and access the home network

Rachel is a network technician. She is writing a proposal that recommends which firewall type to purchase to replace an aging and falling unit. She wants to be able to protect two separate internal network segments with one hardware firewall. What is her recommendation>

Triple-homed

A bastion host firewall stands guard along the pathway of potential attack, positioned to take the brunt of any attack

True

A firewall serves as a clear and distinct boundary between one network area and another

True

A firewall with two interfaces is known as a dual-homed firewall.

True

A firewall's job is to impose all restrictions and boundaries defined in the security policy on all network traffic

True

A guideline for firewall selection is to never skimp on throughput

True

A hardware firewalls is dedicated hardware device specifically built and hardened to support the functions of firewall software.

True

A next-generation firewall (NGFW) is a device that offers additional capabilities beyond traditional firewall functionality

True

A virtual firewall can protect physical networks as well as virtual clients and servers

True

All the rules on a firewall are exceptions

True

An active threat is one that takes some type of initiative to seek out a target to compromise

True

Content filtering can focus on domain name, URL, filename, file extension, or keywords in the content of a packet.

True

Firewalls can provide port-forwarding services

True

Passive threats are those you must seek out to be harmed, such as visiting a malicious website.

True

Static packet filtering uses a static or fixed set of rules to filter network traffic.

True

Windows Defender Firewall is an example of a native firewall

True


Ensembles d'études connexes

Taylor chapter-39 Review Questions. Fluid, Electrolyte, and Acid Base Balance

View Set

4.1 Given a scenario, use the appropriate tool to assess organizational security.

View Set

Demand Supply Elasticity Ch 19 Study Guide

View Set

Psychology Chapter 12: Personality

View Set

Chapter 8- Insurance Regulation/ Laws, Rules, and Regulations Common to All Lines.

View Set

Fundamental Midterm review - evolve

View Set

Chapter 16 Accounting True/False Review

View Set