6.2.3 Firewall Design

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is a firewall function?

Packet filtering

Which of the following combines several layers of security services and network functions into one piece of hardware?

Unified Threat Management (UTM)

Your company has an internet connection. You also have a web server and an email server that you want to make available to your internet users, and you want to create a screened subnet for these two servers. Which of the following should you use?

A network-based firewall

Your Cisco router has three network interfaces configured. S0/1/0 is a WAN interface that is connected to an ISP. F0/0 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24. F0/1 is connected to an Ethernet LAN segment with a network address of 192.168.2.0/24. You have configured an access control list on this router using the following rules: deny ip 192.168.1.0 0.0.0.255 any deny ip 192.168.2.0 0.0.0.255 any These rules will be applied to the WAN interface on the router. Your goal is to block any IP traffic coming in on the WAN interface that has a spoofed source address that makes it appear to be coming from the two internal networks. However, when you enable the ACL, you find that no traffic is being allowed through the WAN interface. What should you do?

Add a permit statement to the bottom of the access list.

Which of the following describes how an extended access control lists can improve network security?

An access control list filters traffic based on the IP header information, such as source or destination IP address, protocol, or socket number.

Which of the following BEST describes a stateful inspection?

Determines the legitimacy of traffic based on the state of the connection from which the traffic originated.

Which of the following are characteristics of a packet-filtering firewall? (Select two.)

Filters IP address and port Stateless A packet-filtering firewall makes decisions about which network traffic to allow by examining information in the IP packet header, such as source and destination addresses, ports, and service protocols. A packet-filtering firewall is considered a stateless firewall because it examines each packet and uses rules to accept or reject each packet without considering whether the packet is part of a valid and active session.

Which of the following are specific to an extended Access control lists? (Select two.)

Use the number ranges 100-199 and 2000-2699. Are the most used type of ACL.

You have used firewalls to create a screened subnet. You have a web server that needs to be accessible to internet users. The web server must communicate with a database server to retrieve product, customer, and order information. How should you place devices on the network to best protect the servers? (Select two.)

Put the database server on the private network. Put the web server inside the screened subnet.

Which of the following are true about routed firewalls? (Select two.)

Counts as a router hop. Supports multiple interfaces.


Set pelajaran terkait

ELECTROCHEMISTRY APCHEM STUDY GUIDE

View Set

Financial Accounting Chapter 3 Key Concepts

View Set

Chapter 11: Physical Development in Middle Childhood

View Set

4.4 Covalent Bonding: Electronegativity and Bond Strength

View Set

BUS 114 Midterm Exam Study Guide

View Set

Real Estate Finance - Unit 7 - test

View Set