Chapter 5 - Network Security Firewalls & VPNS
When setting up port forwarding on an external firewall to pass HTTP traffic from the Internet to an internal web server, the external address and port are 204.40.235.38:8081. What is the internal IP address and port, assuming the most common port for that protocol?
192.168.5.74:80
While the design of a hardware firewall requires it to filter all inbound and outbound traffic, it can also act as a bottleneck for that traffic if the wire speed it filters at is too slow. For a 1 gigabits per second (Gbps) network, what filtering wire speed should the firewall possess?
2 Gbps or higher
Passive threats are those you must act upon to be harmed, such as clicking a link and downloading infected content. An active threat, such as a hacker, seeks out vulnerable targets. Which of the following is least effective against passive threats?
A door lock
Which of the following best describes a network chokepoint?
A specialized kind of gateway that focuses on traffic to a single concentrated pathway to streamline the process of filtering.
Charles is an IT help desk technician. He gets a ticket from a branch office saying that they lost Internet connectivity. He investigates remotely over a backup maintenance link and determines that this was done by design; the office's firewall deliberately severed the connection. Which of the following does this functionality define?
Bastion host
Augustine is a network engineer for a mid-sized company. He needs to deploy a new firewall, which was expensive to purchase and is complex to configure. In preparation for installation and configuration, he attends training conducted by the firewall vendor. Which of the following types of firewalls is he most likely planning to install?
Commercial
Rupesh is a network technician who has been tasked by his supervisor to configure the edge firewall of an office branch. His task is to focus on outbound traffic based on several factors, such as domain name, URL, file extension, and certain keywords. What is he configuring the firewall to perform?
Content filtering
Which of the following is a common firewall philosophy?
Deny by default
What prevents firewall filtering?
Encryption
A host software firewall should never be installed on a server if a dedicated firewall appliance is deployed on the same network.
False
A software firewall can protect multiple hosts from malicious network activity
False
Bump-in-the-wire is a software firewall implementation
False
One of the advantages of an off-the-shelf firewall versus a do-it-yourself firewall is lower cost
False
The sole use of ingress and egress filtering is to eliminate spoofing.
False
Malika is a network engineer who is configuring firewalls separating both the Accounting and HR departments from the rest of the business divisions on the local area network (LAN). She wants to allow only certain traffic into those subnets from both internal employees and those working from home. The traffic may include email, chat, and video conferencing. She wants to prevent access to the company intranets to protect confidential employee and financial data. How was she configured these firewalls?
Filter
Delmar is a consultant configuring a small firewall for a client who uses a small office/home office (SOHO) network. He is permitting the common protocols on the outbound connection, but he can only forward rather than block incoming protocols. If he forwards common protocols such as FTP, Telnet, and NetBIOS, how can this protect the network from anyone who may maliciously use these ports??
Forward to a nonexistent port where no device is listening
Hao is a network security engineer for a mid-sized company. She is redesigning the infrastructure and its resources to provide greater protection from both external and internal threats. She wants to place firewall devices not only where the local area network (LAN) connects to the Internet, but also within the network. Although she doesn't suspect any employees of misusing computer resources, there is always the potential that one might send unauthorized emails or other messages containing confidential company information to a competitor. Which redundant solution should she select that will be most likely to detect malicious behavior by an internal employee?
Host firewalls and firewalls at each subnet
Marcus is studying networking with an emphasis on cybersecurity at a local university. As part of his research, he wants to visit certain hacker sites but is concerned that his laptop would be vulnerable to passive threats while visiting them. He doesn't have the funds for expensive security equipment. What is the least expensive option he has at hand?
Native firewall
Jae is a network consultant hired by a small business client. He has been asked to recommend a firewall solution. Given the relatively small size of the infrastructure, he suggests a firewall that provides integrated intrusion detective system/intrusion prevention system (IDS/IPS) functionality because a single device offering multiple functions is cost- and space-effective. What is the solution?
Next-generation firewall (NGFW)
A firewall is a filtering device that watches for traffic that fails to comply with rules defined by the firewall administrator. What does the firewall inspect?
Packet Header
Geraldine is a freelance network technician. She has been hired to design and build a small office/home office (SOHO) network. She is considering what firewall solution to select, keeping in mind that her client has a tight budget and the network is made up of no more than six nodes. Which of the following is the best solution?
Personal hardware firewall integrated in the wireless access point or modem
Logan is a network administrator. He is considering a firewall purchase for a branch office being built by his company. Above all other considerations, the design requires a device capable of high degree of imposing user access restrictions. What is this called?
Privilege control
Manuela has researched a third-party software firewall she wants to install on her PC since she believes it is a better quality than the operating system's onboard firewall. She has read the installation instructions. The firewall is compatible with her operating system and has gotten good customer reviews. After performing the installation last week, she notices that numerous malicious exploits are successfully hacking her computer. What went wrong?
She forgot to disable the native firewall when she installed the third-party firewall.
Shamika is a networking student who has just moved into a small house with two other roommates. She has purchased a new DSL modem and is planning on configuring the built-in firewall. She needs to change the default username and password for the device first. What is her concern?
The default username and password are likely available on the Internet and anyone could use those credentials to hack into the modem and access the home network
Rachel is a network technician. She is writing a proposal that recommends which firewall type to purchase to replace an aging and falling unit. She wants to be able to protect two separate internal network segments with one hardware firewall. What is her recommendation>
Triple-homed
A bastion host firewall stands guard along the pathway of potential attack, positioned to take the brunt of any attack
True
A firewall serves as a clear and distinct boundary between one network area and another
True
A firewall with two interfaces is known as a dual-homed firewall.
True
A firewall's job is to impose all restrictions and boundaries defined in the security policy on all network traffic
True
A guideline for firewall selection is to never skimp on throughput
True
A hardware firewalls is dedicated hardware device specifically built and hardened to support the functions of firewall software.
True
A next-generation firewall (NGFW) is a device that offers additional capabilities beyond traditional firewall functionality
True
A virtual firewall can protect physical networks as well as virtual clients and servers
True
All the rules on a firewall are exceptions
True
An active threat is one that takes some type of initiative to seek out a target to compromise
True
Content filtering can focus on domain name, URL, filename, file extension, or keywords in the content of a packet.
True
Firewalls can provide port-forwarding services
True
Passive threats are those you must seek out to be harmed, such as visiting a malicious website.
True
Static packet filtering uses a static or fixed set of rules to filter network traffic.
True
Windows Defender Firewall is an example of a native firewall
True