Filters
Question type

Study Flashcards

Describe the importance of the bastion host's performance.

Correct Answer

verifed

verified

The bastion host, although it may not be...

View Answer

Match each item with a statement below. -Primary intent is to let all traffic through and then block specific types of traffic.


A) boot-up password
B) firewall rules
C) bastion host
D) screen saver password
E) restrictive
F) IP forwarding
G) permissive
H) supervisor password
I) caching

Correct Answer

verifed

verified

How should a firewall administrator guard against new risks?

Correct Answer

verifed

verified

A firewall needs regular care and attent...

View Answer

Many companies use the Internet to enable a(n) ____________________ that connects internal hosts with specific clients in other organizations.

Correct Answer

verifed

verified

virtual pr...

View Answer

If a proxy server is in service, ____ should be disabled on routers and other devices that lie between the networks.


A) PAT
B) NAT
C) DNS
D) IP forwarding

Correct Answer

verifed

verified

Computer systems have failed when critical computers were placed on the top floor of buildings that were poorly air conditioned.

Correct Answer

verifed

verified

Match each item with a statement below. -Must be entered to complete the process of starting up a computer.


A) boot-up password
B) firewall rules
C) bastion host
D) screen saver password
E) restrictive
F) IP forwarding
G) permissive
H) supervisor password
I) caching

Correct Answer

verifed

verified

Match each item with a statement below. -Tell the firewall what types of traffic to let in and out of your network.


A) boot-up password
B) firewall rules
C) bastion host
D) screen saver password
E) restrictive
F) IP forwarding
G) permissive
H) supervisor password
I) caching

Correct Answer

verifed

verified

Any firewall hardware can support a proxy server.

Correct Answer

verifed

verified

Match each item with a statement below. -Set of rules that blocks all access by default, and then permits only specific types of traffic to pass through.


A) boot-up password
B) firewall rules
C) bastion host
D) screen saver password
E) restrictive
F) IP forwarding
G) permissive
H) supervisor password
I) caching

Correct Answer

verifed

verified

A(n) ____ approach allows all packets to pass through except those specified to be blocked.


A) Allow-All
B) Allow-Some
C) Port 80
D) Except Video

Correct Answer

verifed

verified

What is IP forwarding?

Correct Answer

verifed

verified

IP forwarding enables a packet to get fr...

View Answer

What is an intrusion detection and prevention system?

Correct Answer

verifed

verified

An intrusion detection and prevention sy...

View Answer

The even distribution of traffic among two or more load-sharing firewalls can be achieved through the use of ____________________ switches, which are network devices with the intelligence to make routing decisions based on source and destination IP address or port numbers as specified in Layer 4 of the OSI reference model.

Correct Answer

verifed

verified

In 2003, GASSP was succeeded by ____.


A) GAAP
B) CISSP
C) GAISP
D) GASSPv2

Correct Answer

verifed

verified

____ of frequently accessed resources, such as Web page text and image files, can dramatically speed up the performance of your network because it reduces the load on your Web servers.


A) Hashing
B) Caching
C) Redundancy
D) Load balancing

Correct Answer

verifed

verified

What are the GAISP nine Pervasive Principles?

Correct Answer

verifed

verified

Accountability-Define and acknowledge ac...

View Answer

A critical ____________________ is defined as a software- or hardware-related item that is indispensable to the operation of a device or program.

Correct Answer

verifed

verified

A firewall must be ____ so its performance can grow along with the network it protects.


A) productive
B) extensible
C) scalable
D) robust

Correct Answer

verifed

verified

The cornerstone of most firewalls is the ____, a set of instructions based on organizational policy, configured by the administrator.


A) rule set
B) IP forwarding set
C) packet filter
D) DNS

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer