chapter 9 Flashcards

1
Q

The firewall may be a single computer system or a set of two or more
systems that cooperate to perform the firewall function.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A firewall can serve as the platform for IPSec.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The firewall can protect against attacks that bypass the firewall

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A packet filtering firewall is typically configured to filter packets going
in both directions.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

One disadvantage of a packet filtering firewall is its simplicity

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The countermeasure to tiny fragment attacks is to discard packets with
an inside source address if the packet arrives on an external interface.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A traditional packet filter makes filtering decisions on an individual
packet basis and does not take into consideration any higher layer context.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A prime disadvantage of an application-level gateway is the additional
processing overhead on each connection.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The primary role of the personal firewall is to deny unauthorized
remote access to the computer.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A DMZ is one of the internal firewalls protecting the bulk of the
enterprise network

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A logical means of implementing an IPSec is in a firewall.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Distributed firewalls protect against internal attacks and provide
protection tailored to specific machines and applications.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An important aspect of a distributed firewall configuration is security
monitoring.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unlike a firewall, an IPS does not block traffic.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Snort Inline enables Snort to function as an intrusion prevention
capability.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_________ control determines the types of Internet services that can be accessed, inbound or outbound.
A. Behavior B. Direction
C. Service D. User

A

Service

17
Q

_________ control controls how particular services are used.
A. Service B. Behavior
C. User D. Direction

A

Behavior

18
Q

_________ control determines the direction in which particular service requests may be initiated and allowed to flow through the firewall.
A. Behavior B. User
C. Direction D. Service

A

Direction

19
Q

________ control controls access to a service according to which user is attempting to access it.
A. User B. Direction
C. Service D. Behavior

A

User

20
Q

The _________ defines the transport protocol.
A. destination IP address B. source IP address
C. interface D. IP protocol field

A

IP protocol field

21
Q

A __________ gateway sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host.
A. packet filtering B. stateful inspection
C. application-level D. circuit-level

A

circuit-level

22
Q

An example of a circuit-level gateway implementation is the __________ package.
A. application-level B. SOCKS
C. SMTP D. stateful inspection

A

SOCKS

23
Q

Typically the systems in the _________ require or foster external connectivity such as a corporate Web site, an e-mail server, or a DNS server.
A. DMZ B. IP protocol field
C. boundary firewall D. VPN

A

DMZ

24
Q

A _________ consists of a set of computers that interconnect by means of a relatively unsecure network and makes use of encryption and special protocols to provide security.
A. proxy B. UTM
C. VPN D. stateful inspection firewall

A

VPN

25
Q

A _________ configuration involves stand-alone firewall devices plus host-based firewalls working together under a central administrative control.
A. packet filtering firewall B. distributed firewall
C. personal firewall D. stateful inspection firewall

A

distributed firewall

26
Q

Typical for SOHO applications, a __________ is a single router between internal and external networks with stateless or full packet filtering.
A. single bastion T B. double bastion inline
C. screening router D. host-resident firewall

A

screening router

27
Q

__________ are attacks that attempt to give ordinary users root access.
A. Privilege-escalation exploits B. Directory transversals
C. File system access D. Modification of system resources

A

Privilege-escalation exploits

28
Q

__________ scans for attack signatures in the context of a traffic stream rather than individual packets.
A. Pattern matching B. Protocol anomaly
C. Traffic anomaly D. Stateful matching

A

Stateful matching

29
Q

__________ looks for deviation from standards set forth in RFCs.
A. Statistical anomaly B. Protocol anomaly
C. Pattern matching D. Traffic anomaly

A

Protocol anomaly

30
Q

The _________ attack is designed to circumvent filtering rules that depend on TCP header information.
A. tiny fragment B. address spoofing
C. source routing D. bastion host

A

tiny fragment