Firewalls (ch 9) Flashcards

1
Q

What are the mechanisms for Defense-in-Depth?

A

Prevent, Detect, Survive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a firewall?

A

Provides secure connectivity between networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The firewall may be a single computer system or a set of two or more systems that cooperate to perform the firewall function.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A firewall can serve as the platform for IPSec.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A packet filtering firewall is typically configured to filter packets going in both directions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A prime disadvantage of an application-level gateway is the additional processing overhead on each connection.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A DMZ is one of the internal firewalls protecting the bulk of the enterprise network.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The _______ defines the transport protocol.

A. destination IP address

B. source IP address

C. interface

D. IP protocol field

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A _________ gateway sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host.

A. packet filtering

B. stateful inspection

C. application-level

D. circuit-level

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Typically the systems in the ________ require or foster external connectivity such as a corporate Web site, an e-mail server, or a DNS server.

A. DMZ

B. IP protocol field

C. boundary firewall

D. VPN

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A _______ configuration involves stand-alone firewall devices plus host-based firewalls working together under a central administrative control.

A. packet filtering firewall

B. distributed firewall

C. personal firewall

D. stateful inspection firewall

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ________ attack is designed to circumvent filtering rules that depend on TCP header information.

A. tiny fragment

B. address spoofing

C. source routing

D. bastion host

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewalls can stop (select all that Apply):
A. Hackers breaking into your system.

B. Internet Traffic that appears to be from a legitimate source.

C. Viruses and worms that spread through the internet

D. Spyware being put on your system.

E. Viruses and worms that are spread through email.

A

A, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A packet filtering firewall is typically configured to filter packets going in both directions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A prime disadvantage of an application-level gateway is the additional processing overhead on each connection.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A packet filtering firewall can device if the current packet is allowed based on another packet that it has just examined.

A

False

17
Q

A stateful inspection firewall needs to keep track of information of an active connection in order to decide on the current packet.

A

True