Formative 5 Flashcards

1
Q

Which network security design typically uses one inside interface, one outside interface, and one DMZ interface?

ZPF

two-interface firewall

demilitarized

layered defense

public

A

demilitarized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which security design uses different types of firewalls and security measures that are combined at different areas of the network to add depth to the security of an organization?

ZPF

private-public

demilitarized

stateful firewall

layered defense

A

layered defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which three statements describe trusted and untrusted areas of the network? (Choose three).

A DMZ is considered a trusted area of the network

Internal networks, except the DMZ, are considered trusted.

Each network security layer is considered trusted and requires no security measures

The public internet is generally considered untrusted

A

Internal networks, except the DMZ, are considered trusted.

In a ZPF network, traffic that moves within zones is generally considered trusted.

The public internet is generally consdiered untrusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which network design groups interfaces into zones with similar functions or features?

private

ZPF

layered

self-zone

demilitarized

A

ZPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are two best practices when implementing firewall security policies?

Strictly control physical access to firewall devices.

Firewall logging is not required due to the complexity of log entries.

Permit all traffic and then implement rules to block specific traffic.

Disable unnecessary network services.

Firewall should only be used at the network edge.

A

Stricy control physical access to firewall devices.

Disable unnecessary network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which statement is a characteristic of a packet filtering firewall?

They have a high impact on network performance.

They are susceptible to IP spoofing.

They filter fragmented packets

They examine each packet in the context of the state of a connection.

A

They are susceptible to IP spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is one benefit of using a next-generation firewall rather than a stateful firewall?

reactive protection against internet threats

support of TCP-based packet filtering

support of logging

integrated use of an intrusion prevention system (IPS)

A

integrated use of an intrusion prevention system (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two characteristics of an application gateway firewall? (Choose two)

Provides an integrated intrusion prevention and detection feature.

Uses connection information maintained in a state table and analyzes traffic at OSI Layers 3, 4 and 5.

Uses a simple policy table look-up to filter traffic based on Layer 3 and Layer 4 information.

Performs most filtering and firewall control in software.

Analyzes traffic at Layers 3, 4, 5 and 7 of the OSI model.

A

Performs most filtering and firewal control in software

Analyzes traffic at Layers 3, 4, 5 and 7 of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two benefits of implementing a firewall in a network? (Choose two)

A firewall will inspect network traffic and forward traffic based solely on the Layer 2 Ethernet MAC address.

A firewall will provide accessibility of applications and sensitive resourrces to external untrusted users.

A firewall will prrevent unauthorized traffic from being tunneled or hidden as legitimate traffic through an enterprise network.

A firewall will sanitze protocol flow.

A firewall will reduce security management complexity

A

A firewall will sanitize protocol flow.

A firewall will reduce security management complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which three layers of the OSI model include information that is commonly inspected by a stateful firewall? (Choose three)

Layer 1

Layer 2

Layer 3

Layer 4

Layer 5

Layer 7

A

Layer 3

Layer 4

Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of firewall is supported by most routers and is the easiest to implement

application gateway firewall

next generation firewall

packet filtering firewall

stateful firewall

A

packet filtering firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of firewall generally has a low impact on network performance?

next generation firewall

stateless firewall

application gateway firewall

stateful firewall

A

stateless firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which two protocols are stateless and do not generate connection information needed to build a state table? (Choose two)

ICMP

UDP

HTTP

FTP

TCP

A

UDP

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of traffic is usualyl blocked when implementing a demilitarlized zone?

traffic originating from the private network and traveling to the DMZ network

traffic originating from the DMZ network and traveling to the private network

traffic that is returning from the DMZ network and traveling to the private network

traffic that is returning from the public network and traveling to the DMZ network

A

traffic originating from the DMZ network and traveling to the private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does a firewall handle traffic that is originating from the DMZ network and traveling to a private network?

Traffic is allowed when it is originating from the private network, but the response traffic from the DMZ network will be blocked.

Traffic is usually not filtered using firewall rules when it is originating from the DMZ network and traveling to a private network.

Traffic is usually allowed when it is originating from the DMZ network and traveling to a private network.

Traffic is usually blocked when it is originating from the DMZ network and traveling to a private network.

A

Traffic is usually blocked when it is originating from the DMZ network and traveling to a private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When implementing a ZPF, which statement describes a zone?

A zone is a group of administrative devices that protect against rogue access point installations.

A zone is a group of one or more interfaces that have similar functions or features.

A zone is a group of hardened computers known as bastion hosts.

A zone is a group of one or more devices that provide backup and disaster recovery mechanisms.

A

A zone is a group of one or more interfaces that have similar functions or features.