Chapter 7 Network Perimeter Security Review Flashcards

1
Q

Of the following, which is a collection of servers that was set up to attract hackers?

A. DMZ
B. Honeypot
C. Honeynet
D. VLAN

A

C. Honeynet

A Honeynet is collection of servers set up to attract hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is likely to be the last rule contained within the ACLs of a firewall?

A. Time of day restrictions
B. Explicit all
C. IP allow any
D. Implicit deny

A

D. Implicit deny

Implicit deny is often the last rule in a firewall; it is added automatically by the firewall, not buy the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following should a security administrator implement to limit web-based traffic that is based on the country of origin? (Select the three best answer.)

A.  AV software
B.  Proxy server
C.  Spam filter
D.  Load balancer
E.  Firewall
F.  URL filter
G.  NIDS
A

B. Proxy server
E. Firewall
F. URL filter

These can all act as tools to reduce or limit the amount of traffic based on a specific country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a layer 7 device used to prevent specific types of HTML tags from passing through to the client computer?

A. Router
B. Firewall
C. Content filter
D. NIDS

A

C. Content filter

A content filter is an application layer device that is used to prevent undesired HTML tags, URLS, certificates, and so on, from passing through to the client computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly