Chapter 7 Network Perimeter Security Review Flashcards
Of the following, which is a collection of servers that was set up to attract hackers?
A. DMZ
B. Honeypot
C. Honeynet
D. VLAN
C. Honeynet
A Honeynet is collection of servers set up to attract hackers.
Which of the following is likely to be the last rule contained within the ACLs of a firewall?
A. Time of day restrictions
B. Explicit all
C. IP allow any
D. Implicit deny
D. Implicit deny
Implicit deny is often the last rule in a firewall; it is added automatically by the firewall, not buy the user.
Which of the following should a security administrator implement to limit web-based traffic that is based on the country of origin? (Select the three best answer.)
A. AV software B. Proxy server C. Spam filter D. Load balancer E. Firewall F. URL filter G. NIDS
B. Proxy server
E. Firewall
F. URL filter
These can all act as tools to reduce or limit the amount of traffic based on a specific country.
Which of the following is a layer 7 device used to prevent specific types of HTML tags from passing through to the client computer?
A. Router
B. Firewall
C. Content filter
D. NIDS
C. Content filter
A content filter is an application layer device that is used to prevent undesired HTML tags, URLS, certificates, and so on, from passing through to the client computers.