CHAPTER 15 PHYSICAL SECURITY AND RISK Flashcards

1
Q

Most firewalls in use today implement something called what?P534

A

Demilitarized zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A standard DMZ setup typically has three or four network cards in the firewall computer?P534T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A DMZ is not a device you buy at the store and just connect turn and forget- you need to permit and deny the ports you want?P534T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What protect data on the inside of a firewall?P534

A

Protocol switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are two ways to implement protocol switching?P534-535

A

bullet points on P 535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What port does TCP use?P536

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What port does UDP use?P536

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does figure 15.4 demonstrates?P536

A

That any TCP/IP packets coming in from the internet can’t pass through into the local network because of the difference in the protocols used by each network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What has the ability of a router or a firewall to discard packets that don’t meet the right criteria/p537

A

Packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Do you need a firewall to guard against attacks on your network’s access point and protocol switching device?P537T/F

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are trying to login and gain access to a communication session and you wont be able to do so because of what?P538

A

A firewall is using dynamic packet filtering with a dynamic state list because the data they send isn’t part of a current valid session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does figure 15.5 depict?P538

A

It is a failed attempt to infiltrate a network protected with a dynamic state list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewalls can also implement something called?P538

A

proxy services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Proxies make good firewalls?P539T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Does proxy hide the IP addresses of all the device on the internal network by exchanging its IP address for the address of any requesting station?P539T/F

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Web proxies also called —— ,handle HTTP requests on behalf of the sending workstation?P539

A

HTTP proxy