FIREWALLS VPNS Flashcards
1
Q
- Firewalls can be categorized by processing mode, development era, or structure.
A
T
2
Q
- The firewall can often be deployed as a separate network containing a number of supporting devices.
A
T
3
Q
- Packet filtering firewalls scan network data packets looking for compliance with or violation of the rules of the firewall’s database.
A
T
4
Q
- A packet’s structure is independent from the nature of the packet.
A
F
5
Q
- The ability to restrict a specific service is now considered standard in most routers and is invisible to the user.
A
T
6
Q
- The application firewall runs special software that acts as a proxy for a service request.
A
T
7
Q
- A Web server is often exposed to higher levels of risk when placed in the DMZ than when it is placed in the untrusted network.
A
F
8
Q
- Circuit gateway firewalls usually look at data traffic flowing between one network and another.
A
F
9
Q
- The Cisco security kernel contains three component technologies: the Interceptor/Packet Analyzer, the Security Verification ENgine (SVEN), and Kernel Proxies.
A
T
10
Q
- Internal computers are always visible to the public network.
A
F
11
Q
- The SMC Barricade residential broadband router does not have an intrusion detection feature.
A
F
12
Q
- One method of protecting the residential user is to install a software firewall directly on the user’s system.
A
T
13
Q
- There are limits to the level of configurability and protection that software firewalls can provide.
A
T
14
Q
- All organizations with an Internet connection have some form of a router at the boundary between the organization’s internal networks and the external service provider.
A
F
15
Q
- The DMZ cannot be a dedicated port on the firewall device linking a single bastion host.
A
F
16
Q
- The screened subnet protects the DMZ systems and information from outside threats by providing a network of intermediate security.
A
T
17
Q
- Good policy and practice dictates that each firewall device, whether a filtering router, bastion host, or other firewall implementation
A
T
18
Q
- Syntax errors in firewall policies are usually difficult to identify.
A
F
19
Q
- When Web services are offered outside the firewall, HTTP traffic should be blocked from internal networks through the use of some form of proxy access or DMZ architecture.
A
T
20
Q
- Firewall Rule Set 1 states that responses to internal requests are not allowed.
A
F
21
Q
- Some firewalls can filter packets by protocol name.
A
T
22
Q
- It is important that e-mail traffic reach your e-mail server and only your e-mail server.
A
T