Firewalls Flashcards

1
Q

Which of the following is a firewall function?

– Protocol converting
– Packet rearranging
– Packet filtering
– FTP hosting
– Encrypting
A

Packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are configuring a network firewall to allow SMTP outbound email traffic, and POP3 inbound email traffic. Which of the following IP ports open on the firewall?

  • 25
  • 443
  • 21
  • 143
  • 110
A
  • 25

- 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You’re configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open ID port 80, 25, 110 and 143. Assuming that no reports in the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?

– Email server, newsgroup server and DNS server
– Web server, email server
– Web server, DNS server, email server
– Web server, DNS server, DHCP server

A

Web server, email server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

And which of the following situations should you install a firewall?

– You want to restrict Internet users from accessing private data on your network
– You want Internet users to see a single IP address when accessing the company network
– You want to improve Internet performance by saving Popular websites locally
– You want to implement a password system for the Internet users to access your private website

A

You want to restrict Internet users from accessing private data on your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following actions taken directly into system security on Windows systems? (Select two)

– Enable Windows firewall
– Disable automatic updates
– Install antivirus software
– Configure 802.11n networking
–Use the test schedule  to make regular backups
A

– Enable Windows firewall

– Install antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To access your company’s internal network from home you use secure shell. The administrator has recently implemented a firewall at the network perimeter and disabled as many points as possible. Which port needs to remain open so you can still work from home?

  • 80
  • 21
  • 443
  • 23
  • 22
A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To increase security on your company’s internal network, the administrator disabled as many points as possible. Now, however though you can browse the Internet, you were unable to perform secured credit card transactions. Which port needs to be able to allow secured transactions?

  • 69
  • 80
  • 21
  • 23
  • 443
A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You want to be able to access your home computer using Remote Desktop when traveling. You enable Remote Desktop, but you find that you cannot access your computer outside your home network. What you do?

– Open the firewall port for the remote desktop program
– Open the telnet and FTP port on your firewall
– Move your home computer outside the firewall
– Configure a VPN connection to your computer

A

Open the firewall port for the remote desktop program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the best device to deploy to protect your private network from a public untrusted network?

  • Hub
  • Gateway
  • Firewall
  • Router
A

-Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly