Network Security Lab 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following statements is true regarding firewalls?

A defense-in-depth structure of firewalls provides more protection for certain subnets than for others.

Which of the following choices in the Action column of the Firewall Rules worksheet means that the questionable incoming packet is discarded (or logged) and provides no indication to the sender that the packet has not reached the intended destination?

Block

Which of the following columns in the Firewall Rules worksheet enables a rule to be made inactive but not deleted, which can be useful for testing purposes or to temporarily allow a certain action?

Disabled

Which of the following statements is true regarding firewalls?

Firewalls can be completely software based and run on an endpoint or a server.

In the lab, for which of the following types of traffic did you NOT specify a rule?

HTTPS

Which of the following are designed to limit access from a trusted network to an untrusted network?

LAN rules

Which of the following firewall default settings generally makes users happier because everything that they wish to do is allowed?

Permissive

The pfSenseFirewallPlanner spreadsheet contains which two worksheets?

Physical Configuration and Firewall Rules

Which of the following columns in the Firewall Rules worksheet enables traffic to be allowed by a certain rule only from specific operating systems and only for Transmission Control Protocol (TCP) traffic?

Source O/S

Which of the following statements is true regarding the pfSense firewall?

The pfSense firewall timestamps log entries.

By default, the pfSense firewall __________ outbound access from the LAN interface.

allows unrestricted

According to the 2013 Data Breach Investigations Report, __________ percent of all successful data breaches involve internal attackers.

firewall

The job of the __________ is to examine traffic going between the "outside" and the "inside," determine whether that traffic adheres to a set of rules, and decide what to do if it does not.

firewall

A(n) __________ is the unique name of the computer on the network capable of originating or responding to an interaction using the Internet Protocol.

hostname

The pfSenseFirewallPlanner spreadsheet is designed to document answers to the questions prompted by the:

pfSense Firewall Setup Wizard.

The process of defining firewall rules can be compared to the process of defining most Access Control Lists (ACLs) because, in both cases, they are:

simple lists of rules that are evaluated in order.

Which of the following choices in the Action column of the Firewall Rules worksheet means that the questionable incoming packet is returned to the sender indicating that the packet or packets they sent were not accepted?

Reject

Which of the following firewall default settings is applied by the pfSense firewall?

Restrictive

Which of the following firewall default settings is the preferred approach from a security standpoint, although it requires more thoughtful configuration of the rules?

Restrictive

The File Transfer Protocol (FTP) uses which transport protocol?

Transmission Control Protocol (TCP)


Set pelajaran terkait

Operations Management - Chapter 4

View Set

Chapter 37: Nursing Care of the Child With an Infectious or Communicable Disorder

View Set

CH. 56 MANAGEMENT OF PATIENTS WITH DERMATOLOGIC DISORDERS PREP

View Set

Facebook Blueprint Certification Exam: 100-101 Digital Marketing Associate

View Set

Chapter 4: Life Policy Provisions & Options

View Set

sensitivity / specificity formulas

View Set