TestOut Network Pro 6.1.8 Practice Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

How does a proxy server differ from a packet-filtering firewall? 1. A proxy server can prevent unknown network attacks, while a packet-filtering firewall can only prevent known attacks. 2. A proxy server operates at the Application layer, while a packet-filtering firewall operates at the Network layer. 3. A proxy server includes filters for the session ID as well as the IP address and port number. 4. A proxy server is used to create a screened subnet, while a packet-filtering firewall can only be used with screened subnets.

2. A proxy server operates at the Application layer, while a packet-filtering firewall operates at the Network layer.

Which of the following is true about a network-based firewall? 1. A network-based firewall is installed at the edge of a private network or network segment. 2. A network-based firewall is installed on a single computer. 3. A network-based firewall is less expensive and easier to use than host-based firewalls. 4. A network-based firewall are considered software firewalls.

1. A network-based firewall is installed at the edge of a private network or network segment.

You have been given a laptop to use for work. You connect the laptop to your company network, use the laptop from home, and use it while traveling. You want to protect the laptop from internet-based attacks. Which solution should you use? 1. Host-based firewall 2. Proxy server 3. Network-based firewall 4. VPN concentrator

1. Host-based firewall

Which of the following are true about reverse proxy? (Select two.) 1. Sits between a client computer and the internet. 2. Can perform load balancing, authentication, and caching. 3. Handles requests from inside a private network out to the internet. 4. Clients always know they are using reverse proxy. 5. Handles requests from the internet to a server on a private network.

2. Can perform load balancing, authentication, and caching. 5. Handles requests from the internet to a server on a private network.

Which of the following chains is used for incoming connections that aren't delivered locally? 1. Reject 2. Forward 3. Drop 4. Output

2. Forward

Which device combines multiple security features, such as anti-spam, load-balancing, and antivirus, into a single network appliance? 1. Next Generation Firewall (NGFW) 2. Unified Threat Management (UTM) 3. Circuit-level gateway 4. Packet-filtering firewall

2. Unified Threat Management (UTM)

Which of the following is true about a firewall? 1. Firewalls protect against email spoofing attacks. 2. You must manually specify which traffic you want to allow through the firewall. Everything else is blocked. 3. Implicit deny is used to deny permissions to a specific user even when the rest of the user's group is allowed access. 4. Host-based firewalls and network-based firewalls can be installed separately, but they cannot be placed together to provide multiple layers of protection.

2. You must manually specify which traffic you want to allow through the firewall. Everything else is blocked.

Which of the following does the sudo iptables -F command accomplish? 1. Saves changes to iptables. 2. Drops all incoming traffic. 3. Clears all the current rules. 4. Lists all the current rules.

3. Clears all the current rules.

Which options are you able to set on a firewall? (Select three.) 1. Acknowledgement number 2. Checksum 3. Sequence number 4. Port number 5. Packet destination address 6. Packet source address 7. Digital signature

4. Port number 5. Packet destination address 6. Packet source address

Based on the diagram, which type of proxy server is handling the client's request? 1. Circuit-level proxy server 2. Forward proxy server 3. Open proxy server 4. Reverse proxy server

4. Reverse proxy server


Ensembles d'études connexes

Carlos explora Lima, Perú - Productos, lugares, y/o personas

View Set

NCLEX_Musculoskeletal Disorders 222Q no exp

View Set

10: rocks from melts (igneous activity in a plat tectonic context)

View Set

Campos Semánticos, palabras compuestas y sustantivos- Español 5to- Liceo

View Set