Filters
Question type

Study Flashcards

SPI firewalls can conduct ________ inspection.


A) stateful packet
B) static packet filtering
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

A state is a distinct phase in a connection between two applications.

Correct Answer

verifed

verified

Ingress ACL rules typically permit a specific type of externally originated connection to network resources.

Correct Answer

verifed

verified

If a firewall receives a suspicious packet, the firewall will ________.


A) log the packet
B) drop the packet
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

A connection opening is a state.

Correct Answer

verifed

verified

Static packet filtering is sometimes used ________.


A) as a secondary filtering mechanism on an application proxy firewall
B) on border routers
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

Static packet filtering firewalls are limited to ________.


A) inspecting packets for which there are good application proxy filtering rules
B) inspecting packets in isolation from their context
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

The ________ is a subnet that contains all of the servers and application proxy firewalls that must be accessible to the outside world.


A) Internet subnet
B) server subnet
C) external subnet
D) None of the above

Correct Answer

verifed

verified

Stateful packet inspection firewalls are ________.


A) expensive
B) fairly safe in practice
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

IDSs tend to issue many false negatives.

Correct Answer

verifed

verified

Automatic protections for application proxy firewalls include ________.


A) protocol fidelity
B) header destruction
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

________ detection looks for specific patterns in the network traffic to identify a threat.


A) Signature
B) Anomaly
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

Firewalls will drop ________.


A) suspicious packets
B) provable attack packets
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

It is getting easier for attackers to bypass the border firewall.

Correct Answer

verifed

verified

What is the SPI firewall rule for packets that do not attempt to open connections?


A) Drop the packet unless it is permitted by an ACL
B) Pass the packet unless it is forbidden by an ACL
C) Pass the packet if it is part of a previously approved connection
D) Either A or B

Correct Answer

verifed

verified

IDSs need to filter individual packets rather than packet streams.

Correct Answer

verifed

verified

If a firewall has to drop packets because it cannot keep up with traffic volume, this is ________.


A) good because it will prevent possible attack packets from entering the network
B) bad because valid, non-attack packets will be dropped and this will effectively created a self-generated DOS attack
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

A ________ attack is an attack that is made before attack signatures for the threat are defined.


A) zero-day
B) vulnerability based
C) stealth
D) anomaly based

Correct Answer

verifed

verified

________ detection looks at traffic patterns for deviations from set norms.


A) Signature
B) Anomaly
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

If an IPS identifies an attack, it can ________.


A) drop the attack packet(s)
B) limit suspicious traffic to a certain percentage of the total bandwidth
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

Showing 41 - 60 of 100

Related Exams

Show Answer