Filters
Question type

Study Flashcards

It is important that e-mail traffic reach your e-mail server and only your e-mail server.

Correct Answer

verifed

verified

A(n)____________________ private network is a private and secure network connection between systems that uses the data communication capability of an unsecured and public network.

Correct Answer

verifed

verified

Syntax errors in firewall policies are usually difficult to identify.

Correct Answer

verifed

verified

False

What must a VPN that proposes to offer a secure and reliable capability while relying on public networks accomplish?

Correct Answer

verifed

verified

- Encapsulation of incoming and outgoing...

View Answer

Some firewalls can filter packets by protocol name.

Correct Answer

verifed

verified

A packet's structure is independent from the nature of the packet.

Correct Answer

verifed

verified

The static packet filtering firewall allows only a particular packet with a particular source,destination,and port address to enter through the firewall._________________________

Correct Answer

verifed

verified

The general approach of the ____________________ protocol is to place the filtering requirements on the individual workstation rather than on a single point of defense (and thus point of failure).

Correct Answer

verifed

verified

In ____ mode,the data within an IP packet is encrypted,but the header information is not.


A) tunnel
B) transport
C) public
D) symmetric

Correct Answer

verifed

verified

The Cisco security kernel contains three component technologies: the Interceptor/Packet Analyzer,the Security Verification ENgine (SVEN),and Kernel Proxies.

Correct Answer

verifed

verified

Static filtering is common in network routers and gateways._________________________

Correct Answer

verifed

verified

An attacker who suspects that an organization has dial-up lines can use a device called a(n)war dialer to locate the connection points._________________________

Correct Answer

verifed

verified

The popular use for tunnel mode VPNs is the end-to-end transport of encrypted data._________________________

Correct Answer

verifed

verified

SESAME uses ____________________ key encryption to distribute secret keys.

Correct Answer

verifed

verified

public

Firewalls fall into ____ major processing-mode categories.


A) two
B) three
C) four
D) five

Correct Answer

verifed

verified

Access control is achieved by means of a combination of policies,programs,and technologies._________________________

Correct Answer

verifed

verified

Good policy and practice dictates that each firewall device,whether a filtering router,bastion host,or other firewall implementation,must have its own set of configuration rules.

Correct Answer

verifed

verified

There are limits to the level of configurability and protection that software firewalls can provide.

Correct Answer

verifed

verified

True

A content filter is technically a firewall.

Correct Answer

verifed

verified

Internal computers are always visible to the public network.

Correct Answer

verifed

verified

Showing 1 - 20 of 108

Related Exams

Show Answer