Filters
Question type

Study Flashcards

Describe a packet-filtering scenario that works with the DMZ.

Correct Answer

verifed

verified

One type of configuration combines packe...

View Answer

What type of attack are stateless packet filters particularly vulnerable to?


A) attempts to connect to ports above 1023
B) attempts to connect to the firewall
C) IP spoofing attacks
D) attempts to connect to ports below 1023

Correct Answer

verifed

verified

Describe a hardware firewall and include one or more advantages and disadvantages.

Correct Answer

verifed

verified

One advantage of hardware firewalls is t...

View Answer

What are the most common features of IP protocol headers that stateless packet filters base their filtering decisions on?

Correct Answer

verifed

verified

IP address-Each packet-filtering rule sp...

View Answer

MATCHING -a file maintained by stateful packet filters that contains a record of all current connections


A) cleanup rule
B) firewall
C) firewall appliance
D) firewall policy
E) proxy server
F) rule base
G) socket
H) state table
I) stateful packet filters
J) stateless packet filters

Correct Answer

verifed

verified

What is a suggested maximum size of a rule base?


A) 30 rules
B) 300 rules
C) 10 rules
D) 100 rules

Correct Answer

verifed

verified

Which of the following is NOT a criteria typically used by stateless packet filters to determine whether or not to block packets.


A) IP address
B) ports
C) data patterns
D) TCP flags

Correct Answer

verifed

verified

Which of the following is described as the combination of an IP address and a port number?


A) portal
B) subnet
C) datagram
D) socket

Correct Answer

verifed

verified

Which element of a rule base conceals internal names and IP addresses from users outside the network?


A) tracking
B) filtering
C) NAT
D) QoS

Correct Answer

verifed

verified

Stateless packet filtering keeps a record of connections that a host computer has made with other computers.

Correct Answer

verifed

verified

What are the two standard ports used by FTP along with their function?


A) UDP 23 control, TCP 20 data
B) UDP 20 data, TCP 21 control
C) TCP 21 control, TCP 20 data
D) TCP 23 data, TCP 21 control

Correct Answer

verifed

verified

Describe a software firewall and include one or more advantages and disadvantages.

Correct Answer

verifed

verified

A software firewall can be combined with...

View Answer

MATCHING -filters that are similar to stateless packet filters,except that they also determine whether to allow or block packets based on information about current connections


A) cleanup rule
B) firewall
C) firewall appliance
D) firewall policy
E) proxy server
F) rule base
G) socket
H) state table
I) stateful packet filters
J) stateless packet filters

Correct Answer

verifed

verified

MATCHING -hardware devices with firewall functionality


A) cleanup rule
B) firewall
C) firewall appliance
D) firewall policy
E) proxy server
F) rule base
G) socket
H) state table
I) stateful packet filters
J) stateless packet filters

Correct Answer

verifed

verified

Which of the following is NOT an ICMPv6 packet type that you should allow within your organization but never outside the organization?


A) Destination unreachable
B) Packet too big
C) Time Exceeded
D) Packet Redirect

Correct Answer

verifed

verified

The rule base should permit access to public servers in the _________ and enable users to access the Internet.

Correct Answer

verifed

verified

DMZ
demili...

View Answer

What is stateful packet filtering?

Correct Answer

verifed

verified

Stateful packet filters keep a record of...

View Answer

MATCHING -the collection of rules that filter traffic at an interface of a firewall


A) cleanup rule
B) firewall
C) firewall appliance
D) firewall policy
E) proxy server
F) rule base
G) socket
H) state table
I) stateful packet filters
J) stateless packet filters

Correct Answer

verifed

verified

MATCHING -simple filters that determine whether to allow or block packets based on information in protocol headers


A) cleanup rule
B) firewall
C) firewall appliance
D) firewall policy
E) proxy server
F) rule base
G) socket
H) state table
I) stateful packet filters
J) stateless packet filters

Correct Answer

verifed

verified

At what layer of the OSI model do proxy servers generally operate?


A) Application
B) Session
C) Transport
D) Network

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer