480 Chapter 9
Which of the following is an advantage of using a hardware firewall rather than a software firewall? (Choose all that apply) A. Scalability B. Cost D. Ease of maintenance D. Increased throughput
A. Scalability D. Increased throughput
The Windows RPC service works like the UNIX ____ service. a. Mountd B. Portmapper c. QOTD D. INFS
B. Portmapper
Stateless packet filters are more secure than stateful packet filters because they do not contain a state table that can be exploited by an attacker. True or False?
False
When you request a web page, which port does the web server use to send you the page? A. 80 B. 443 C. One higher than 1023 D. One lower than 1023
A. 80
Stateless packet filters allow or block packets based on which of the following? A. Status of the connection B. Information in protocol headers C. State table D. Packets that have been handled previously
B. Information in protocol headers
Which port is used for name/address resolution? A. 20 B. 53 C. 80 D. 110
B. 53
A firewall policy does which of the following? (choose all that apply) A. Describes how employees can use the firewall B. Identifies and mitigates risks C. Explains how the firewall is set up, managed, and updated D. Specifics on how the firewall should handle application traffic
B. Identifies and mitigates risks C. Explains how the firewall is set up, managed, and updated D. Specifics on how the firewall should handle application traffic
Which of the following is a guideline for developing a firewall rule base? (Choose all that apply.) A. The rule base should restrict all Internet access B. The rule base should restrict access to ports and subnets on the internal network from the Internet C. The rule base should be as detailed as possible D. The rule base should not interfere with application traffic
B. The rule base should restrict access to ports and subnets on the internal network from the Internet D. The rule base should not interfere with application traffic
A rule base should end with a(n) _____ rule. A. Reject B. Allow C. Cleanup D. Block
C. Cleanup
Which of the following is an advantage of using a software firewall rather than a hardware firewall? A. Throughput B. Reliability C. Cost D. Availability
C. Cost
A firewall can do which of the following? (Choose all that apply.) A. Screen traffic for viruses B. Determine what user is sending transmissions C. Filter traffic based on rules. D. Provide a layer of protection for the network
C. Filter traffic based on rules. D. Provide a layer of protection for the network
Almost every type of firewall depends on what configurable feature for its effectiveness? A. Network connection B. State Table C. Rule base D. Management console
C. Rule base
Where should you place the most important rules in a rule base? a. In the connection log file B. At the bottom of the rule base C. In the state table D. At the top of the rule base
D. At the top of the rule base
A socket is a combination of a(n) ____ and a(n) _____. A. NetBIOS name, port number B. Port number, MAC address C. MAC Address, IP address D. IP address, port number
D. IP address, port number
A firewall is an effective stand-alone security solution. True or False?
False