• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back
15.01
In general, firewalls work by ___________________.
A. Rejecting all packets regardless of security restrictions
B. Forwarding all packets regardless of security restrictions
C. Allowing only packets that pass security restrictions to be forwarded
D. None of the above


In general, firewalls work by ___________________.
A. Rejecting all packets regardless of security restrictions
B. Forwarding all packets regardless of security restrictions
C. Allowing only packets that pass security restrictions to be forwarded
D. None of the above



15.02
Which layer of the OSI model do software firewalls operate in? (Choose all that apply.)
A. Application
B. Presentation
C. Physical
D. Network


Which layer of the OSI model do software firewalls operate in? (Choose all that apply.)
A. Application
B. Presentation
C. Physical
D. Network



15.03
What is the main difference between a network-based firewall and a host-based firewall?
A. A network-based firewall protects the Internet from attacks.
B. A network-based firewall protects a network, not just a single host.
C. A network-based firewall protects the network wires.
D. A network-based firewall protects a CD from data loss.


What is the main difference between a network-based firewall and a host-based firewall?
A. A network-based firewall protects the Internet from attacks.
B. A network-based firewall protects a network, not just a single host.
C. A network-based firewall protects the network wires.
D. A network-based firewall protects a CD from data loss.



15.04
What is one advantage that a stateless firewall has over its stateful counterparts?
A. It’s faster.
B. It utilizes less memory.
C. It’s better at preventing network attacks.
D. It works better on external networks.


What is one advantage that a stateless firewall has over its stateful counterparts?
A. It’s faster.
B. It utilizes less memory.
C. It’s better at preventing network attacks.
D. It works better on external networks.



15.05
A network administrator needs to filter unwanted packets when implementing the company's’
security policies. What should be implemented to help exercise control over future
network traffic?
A. Access control list (ACL)
B. Proxy server
C. Intrusion Prevention System
D. VPN concentrator


A network administrator needs to filter unwanted packets when implementing the company's’
security policies. What should be implemented to help exercise control over future
network traffic?
A. Access control list (ACL) (ACL’s allow routers to filter packets, and give admins greater control over network traffic.)
B. Proxy server
C. Intrusion Prevention System
D. VPN concentrator



15.06
What is the benefit of using a firewall?
A. Protects external users
B. Protects external hardware
C. Protects LAN resources
D. Protects hardware from failure


What is the benefit of using a firewall?
A. Protects external users
B. Protects external hardware
C. Protects LAN resources
D. Protects hardware from failure



15.07
Your company uses a custom TCP port number of 9080 that is hosted on your DMZ server.
Users can no longer access a custom application that uses this port. You’ve verified that
the firewall is permitting this TCP port. Which command can you use to verify the DMZ
server is still accepting connections on TCP port 9080?
A. ping
B. telnet
C. nbtstat
D. netstat
E. ipconfig


Your company uses a custom TCP port number of 9080 that is hosted on your DMZ server.
Users can no longer access a custom application that uses this port. You’ve verified that
the firewall is permitting this TCP port. Which command can you use to verify the DMZ
server is still accepting connections on TCP port 9080?
A. ping
B. telnet
C. nbtstat
D. netstat
E. ipconfig



15.08
Which device can limit traffic on a network and allow access onto specific TCP/IP port
numbers when security is a concern?
A. Hub
B. Firewall
C. DNS
D. Modem


Which device can limit traffic on a network and allow access onto specific TCP/IP port
numbers when security is a concern?
A. Hub
B. Firewall
C. DNS
D. Modem



15.09
Which is not a type of access control list (ACL)?
A. Standard
B. Extended
C. Referred
D. Outbound


Which is not a type of access control list (ACL)?
A. Standard
B. Extended
C. Referred
D. Outbound



15.10
A network administrator is creating an outbound ACL. Which of the following is not a
general access-list guideline that should be followed when the network administrator is
creating and implementing ACLs on the router?
A. Use only one ACL per interface per protocol per direction.
B. Place IP-extended ACLs as far away from the source as possible.
C. Create ACLs and then apply them to an interface.
D. Every list should have at least one permit statement or it will deny all traffic.


A network administrator is creating an outbound ACL. Which of the following is not a
general access-list guideline that should be followed when the network administrator is
creating and implementing ACLs on the router?
A. Use only one ACL per interface per protocol per direction.
B. Place IP-extended ACLs as far away from the source as possible.
C. Create ACLs and then apply them to an interface.
D. Every list should have at least one permit statement or it will deny all traffic.



15.11
What is the best explanation for a DMZ?
A. To separate a security zone for an IPS and IDS server
B. To create a security zone for VPN terminations
C. To create a security zone that allows public traffic but is isolated from the private
inside network
D. To create a security zone that allows private traffic but is isolated from the public
network


What is the best explanation for a DMZ?
A. To separate a security zone for an IPS and IDS server
B. To create a security zone for VPN terminations
C. To create a security zone that allows public traffic but is isolated from the private
inside network

D. To create a security zone that allows private traffic but is isolated from the public
network



15.12
Which of the following are types of services that firewalls can provide? (Choose all that apply.)
A. Content filtering
B. Segregate network segments
C. Signature identification
D. Scanning services
E. All of the above


Which of the following are types of services that firewalls can provide? (Choose all that apply.)
A. Content filtering
B. Segregate network segments
C. Signature identification
D. Scanning services
E. All of the above



15.13
Which type of security device monitors network traffic, looking for signs of an intrusion?
A. Intrusion Detection System
B. Demilitarized zone (DMZ)
C. Firewall
D. VPN concentrator


Which type of security device monitors network traffic, looking for signs of an intrusion?
A. Intrusion Detection System
B. Demilitarized zone (DMZ)
C. Firewall
D. VPN concentrator



15.14
Which of these application-layer protocols is not secure?
A. SSH
B. HTTP
C. HTTPS
D. SNMPv3


Which of these application-layer protocols is not secure?
A. SSH
B. HTTP
C. HTTPS
D. SNMPv3



15.15
Which of these application-layer protocols is secure?
A. SFTP
B. RSH
C. SNMPv1
D. SNMPv2


Which of these application-layer protocols is secure?
A. SFTP (Note that SMTPv3 is secure, but v1 and v2 are not.)
B. RSH
C. SNMPv1
D. SNMPv2



15.16
Changing network configurations, terminating sessions, and deceiving the attacker are
actions that can be taken from what type of security device?
A. Access control list (ACL)
B. Content filtering
C. Security zones
D. Intrusion Prevention System (IPS)


Changing network configurations, terminating sessions, and deceiving the attacker are
actions that can be taken from what type of security device?
A. Access control list (ACL)
B. Content filtering
C. Security zones
D. Intrusion Prevention System (IPS)



15.17
Which of the following are access-control principles that should be followed? (Choose all
that apply.)
A. Use implicit deny or allow.
B. Follow the least-privilege model.
C. Separate out administrative duties.
D. Rotate administrator jobs.
E. All of the above


Which of the following are access-control principles that should be followed? (Choose all
that apply.)
A. Use implicit deny or allow.
B. Follow the least-privilege model.
C. Separate out administrative duties.
D. Rotate administrator jobs.
E. All of the above<.b>



15.18
Which protocol uses port 22 by default?
A. Telnet
B. FTP
C. SSH
D. HTTPS


Which protocol uses port 22 by default?
A. Telnet
B. FTP
C. SSH
D. HTTPS



15.19
A network administrator needs to transfer files from one computer to another. What protocol
would most likely be used in this scenario?
A. Telnet
B. FTP
C. HTTP
D. RCP


A network administrator needs to transfer files from one computer to another. What protocol
would most likely be used in this scenario?
A. Telnet
B. FTP
C. HTTP
D. RCP



15.20
What protocol can be used to transfer files and is similar to FTP but not secure?
A. SCP
B. SFTP
C. SSH
D. TFTP


What protocol can be used to transfer files and is similar to FTP but not secure?
A. SCP
B. SFTP
C. SSH
D. TFTP (This question is phrased odd, since FTP is not secure either.)



15.21
Which type of security device employs a redirection device known as a honeypot?

Intrusion Prevention System


15.22
Which type of firewall keeps track of existing connections passing through it?

Stateful


15.23
If you wanted to ensure that your firewall could block inflammatory email, which type of
service would you look for?


Content filtering


15.24
A firewall’s list of rules that it uses to block traffic is called ___________________.

Access Control List (ACL)


15.25
If you wanted to allow remote access to 500 users, which type of device is recommended?

A VPN concentrator


15.26
If data from one of your subnets should be restricted from entering another subnet, the
subnets should be configured as different ___________________.


Security zones


15.27
Which unsecure protocol uses port 80 by default?

HTTP


15.28
Which unsecure protocol utilizes arbitrary port numbers to complete its work?

FTP


15.29
What port number does Secure Shell (SSH) use by default?

22


15.30
Logging, notification, and shunning are what types of reactions from what type of
security device?


Passive reactions from an IDS