Filters
Question type

Study Flashcards

ACLs filter packets by using a __________ base to determine whether to allow a packet to pass.

Correct Answer

verifed

verified

rule

Which of the following is a typical drawback of a free firewall program?


A) cannot monitor traffic in real time
B) oversimplified configuration
C) have centralized management
D) more expensive than hardware firewalls

Correct Answer

verifed

verified

What should a company concerned about protecting its data warehouses and employee privacy might consider installing on the network perimeter to prevent direct connections between the internal network and the Internet?


A) router
B) VPN server
C) ICMP monitor
D) proxy server

Correct Answer

verifed

verified

D

Which of the following is a method for supporting IPv6 on IPv4 networks until IPv6 is universally adopted?


A) Teredo tunneling
B) ICMPv6 encapsulation
C) IPsec tunneling
D) SMTP/S tunneling

Correct Answer

verifed

verified

Which of the following is an advantage of hardware firewalls?


A) not scalable compared to software firewalls
B) not dependent on a conventional OS
C) less expensive than software firewalls
D) easy to patch

Correct Answer

verifed

verified

MATCHING -hardware or software configured to block unauthorized access to a network


A) cleanup rule
B) firewall
C) firewall appliance
D) firewall policy
E) proxy server
F) rule base
G) socket
H) state table
I) stateful packet filters
J) stateless packet filters

Correct Answer

verifed

verified

B

What is considered the 'cleanup rule' on a Cisco router?


A) explicit allow all
B) implicit deny all
C) explicit prompt
D) implicit allow

Correct Answer

verifed

verified

A firewall can consist of all devices positioned on the network _____________.

Correct Answer

verifed

verified

What service uses UDP port 53?


A) SMTP
B) DNS
C) ICMP
D) TFTP

Correct Answer

verifed

verified

Describe a firewall policy for application traffic.

Correct Answer

verifed

verified

A firewall policy is an addition to the ...

View Answer

Which two ports should packet-filtering rules address when establishing rules for Web access?


A) 143, 80
B) 25, 110
C) 80, 443
D) 423, 88

Correct Answer

verifed

verified

Which of the following is a general practice for a rule base?


A) begin by blocking all traffic and end by allowing selective services
B) permit access to public servers in the DMZ
C) allow all access to the firewall
D) allow direct access from the Internet to computers behind the firewall

Correct Answer

verifed

verified

What is a cleanup rule? Provide an example.

Correct Answer

verifed

verified

A cleanup rule handles any other packets...

View Answer

What makes an effective rule base? List three points to consider.

Correct Answer

verifed

verified

It should be based on the organization's...

View Answer

Firewalls can protect against employees copying confidential data from within the network.

Correct Answer

verifed

verified

MATCHING -software that forwards network packets and caches Web pages to speed up network performance


A) cleanup rule
B) firewall
C) firewall appliance
D) firewall policy
E) proxy server
F) rule base
G) socket
H) state table
I) stateful packet filters
J) stateless packet filters

Correct Answer

verifed

verified

Generally,connections to instant-messaging ports are harmless and should be allowed.

Correct Answer

verifed

verified

A primary objective of a rule base is to ______________ communications based on complex rules.

Correct Answer

verifed

verified

Software firewalls are usually more scalable than hardware firewalls.

Correct Answer

verifed

verified

MATCHING -a packet-filtering rule that comes last in a rule base and covers any packets that have not been covered by preceding rules


A) cleanup rule
B) firewall
C) firewall appliance
D) firewall policy
E) proxy server
F) rule base
G) socket
H) state table
I) stateful packet filters
J) stateless packet filters

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer