Formative 5 Flashcards
Which network security design typically uses one inside interface, one outside interface, and one DMZ interface?
ZPF
two-interface firewall
demilitarized
layered defense
public
demilitarized
Which security design uses different types of firewalls and security measures that are combined at different areas of the network to add depth to the security of an organization?
ZPF
private-public
demilitarized
stateful firewall
layered defense
layered defense
Which three statements describe trusted and untrusted areas of the network? (Choose three).
A DMZ is considered a trusted area of the network
Internal networks, except the DMZ, are considered trusted.
Each network security layer is considered trusted and requires no security measures
The public internet is generally considered untrusted
Internal networks, except the DMZ, are considered trusted.
In a ZPF network, traffic that moves within zones is generally considered trusted.
The public internet is generally consdiered untrusted.
Which network design groups interfaces into zones with similar functions or features?
private
ZPF
layered
self-zone
demilitarized
ZPF
What are two best practices when implementing firewall security policies?
Strictly control physical access to firewall devices.
Firewall logging is not required due to the complexity of log entries.
Permit all traffic and then implement rules to block specific traffic.
Disable unnecessary network services.
Firewall should only be used at the network edge.
Stricy control physical access to firewall devices.
Disable unnecessary network services.
Which statement is a characteristic of a packet filtering firewall?
They have a high impact on network performance.
They are susceptible to IP spoofing.
They filter fragmented packets
They examine each packet in the context of the state of a connection.
They are susceptible to IP spoofing.
What is one benefit of using a next-generation firewall rather than a stateful firewall?
reactive protection against internet threats
support of TCP-based packet filtering
support of logging
integrated use of an intrusion prevention system (IPS)
integrated use of an intrusion prevention system (IPS)
What are two characteristics of an application gateway firewall? (Choose two)
Provides an integrated intrusion prevention and detection feature.
Uses connection information maintained in a state table and analyzes traffic at OSI Layers 3, 4 and 5.
Uses a simple policy table look-up to filter traffic based on Layer 3 and Layer 4 information.
Performs most filtering and firewall control in software.
Analyzes traffic at Layers 3, 4, 5 and 7 of the OSI model.
Performs most filtering and firewal control in software
Analyzes traffic at Layers 3, 4, 5 and 7 of the OSI model.
What are two benefits of implementing a firewall in a network? (Choose two)
A firewall will inspect network traffic and forward traffic based solely on the Layer 2 Ethernet MAC address.
A firewall will provide accessibility of applications and sensitive resourrces to external untrusted users.
A firewall will prrevent unauthorized traffic from being tunneled or hidden as legitimate traffic through an enterprise network.
A firewall will sanitze protocol flow.
A firewall will reduce security management complexity
A firewall will sanitize protocol flow.
A firewall will reduce security management complexity
Which three layers of the OSI model include information that is commonly inspected by a stateful firewall? (Choose three)
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Layer 7
Layer 3
Layer 4
Layer 5
Which type of firewall is supported by most routers and is the easiest to implement
application gateway firewall
next generation firewall
packet filtering firewall
stateful firewall
packet filtering firewall
Which type of firewall generally has a low impact on network performance?
next generation firewall
stateless firewall
application gateway firewall
stateful firewall
stateless firewall
Which two protocols are stateless and do not generate connection information needed to build a state table? (Choose two)
ICMP
UDP
HTTP
FTP
TCP
UDP
ICMP
Which type of traffic is usualyl blocked when implementing a demilitarlized zone?
traffic originating from the private network and traveling to the DMZ network
traffic originating from the DMZ network and traveling to the private network
traffic that is returning from the DMZ network and traveling to the private network
traffic that is returning from the public network and traveling to the DMZ network
traffic originating from the DMZ network and traveling to the private network
How does a firewall handle traffic that is originating from the DMZ network and traveling to a private network?
Traffic is allowed when it is originating from the private network, but the response traffic from the DMZ network will be blocked.
Traffic is usually not filtered using firewall rules when it is originating from the DMZ network and traveling to a private network.
Traffic is usually allowed when it is originating from the DMZ network and traveling to a private network.
Traffic is usually blocked when it is originating from the DMZ network and traveling to a private network.
Traffic is usually blocked when it is originating from the DMZ network and traveling to a private network.