IS3220 CHAPTER 10 Flashcards

1
Q

A form of threat that takes some type of initiative to seek out a target to compromise is called ___?
These can be hackers, intruders, or automated worms. These seek out vulnerable targets. If you don’t have reasonable security measures and this discovers your system, you might be at risk for a compromise.

A

ACTIVE THREATS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is a small text file used by Web browsers and servers to track Web sessions is called ___?
It blocks the sending and receiving of cookies. Blocking can reduce some threats of session tracking identify theft, but can also disable many Web-based services such as online purchasing.

A

COOKIE FILTER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A firewall within an operating system or hardware device placed there by the vendor or manufacturer is called ___?
Can also include firewalls not necessarily installed b default, but which you can add to a system through an update or patch installation is.

A

NATIVE FIREWALL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Any harmful code or site that depends upon the user’s actions to be accessed or activated is called ___?
If users never visit an infected site or do not perform the risky activity, the threat never reaches them. It is similar to a virus in that it depends upon the activity of the user to activate, infect, and spread.

A

PASSIVE THREATS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A software tool that prevents or restricts Web sites from automatically opening additional tabs or windows without the user’s consent is called ___?
These additional windows are commonly used as methods of advertising, as well as elements in social engineering and distribution of malicious code.

A

POP-UP BLOCKER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What types of internet threats are considered passive, in the sense that the user must seek them out to be harmed? (Select all that apply)
  2. Malicious Web sites
  3. Worms
  4. Downloaded content
  5. SPAM
  6. Trojan Horse
A

Malicious Web sites

Downloaded content

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Average home users and workers at a large corporation can both benefit from which of the following:
  2. Open-source hardware firewall
  3. Gateway server firewall
  4. Commercial appliance firewall
  5. Host firewall
  6. Proprietary device firewall
A

Host firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What are the two locations that a home or SOHO user is likely to find a firewall by default? (Select all that apply)
  2. A self-installed software firewall
  3. Hosted by the operating system
  4. A build-it yourself appliance firewall
  5. Hosted by the ISP connection device
  6. A commercial firewall device
A

Hosted by the operating system

Hosted by the ISP connection device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Windows operating systems are the only operating systems that include a native or default host firewall.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What is the maximum number of host software firewalls that should be operating on a single computer at any point in time?
  2. One
  3. Two
  4. Three
  5. Four
  6. None
A

One

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Firewalls are design to provide protection for both ___ and ___ communications.
A

inbound

outbound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. An organization should consider purchasing last year’s model firewall instead of this year if they receive a significant discount.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. When considering the deployment of a firewall, which of the following should be considered?
  2. Commercial firewalls
  3. Legacy firewalls
  4. Open-source firewalls
  5. Beta firewalls
  6. Do-it-yourself (IY) firewalls
A

Commercial firewalls

Open-source firewalls

Do-it-yourself (IY) firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. The Window 7 firewall includes a new easy-to-configure feature that allows file and printer sharing between systems authorized by a password. This feature no longer encourages users to just turn off the whole firewall rather than figure out how to properly configure file and printer sharing access rules. What is this feature called?
  2. Internet connection sharing
  3. Quick config
  4. Homegroup
  5. Shared computing
  6. Microsoft Easy Access Firewall
A

Homegroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. What is the command line tool used to configure the Windows 7 firewall?
  2. route firewall
  3. netsh advfirewall firewall
  4. new use firewall
  5. firewall config
  6. netsh firewall
A

netsh advfirewall firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Using a Linus software firewall as a replacement for commercial firewall appliance can be a very cost-effective solution. Linus often can repurpose computer hardware that is no longer sufficient to support larger, bulkier, more resource-intensive operating systems.
    TRUE OR FALSE
A

TRUE

17
Q
  1. The firewall configuration on an ISP connection device is most commonly access through what type of management interface?
  2. SMTP
  3. HTTP/HTTPS
  4. SSH
  5. FTP
  6. RSH
A

HTTP/HTTPS

18
Q
  1. If your ISP refuses to grant access to configure their connection device, what legal options are available to you as alternatives? (Select all that apply)
  2. Live without configuring it
  3. Hack into it
  4. Deploy your own hardware firewall alternative
  5. Purchase your own connection device
  6. Change ISPs
A

Live without configuring it

Deploy your own hardware firewall alternative

Purchase your own connection device

Change ISPs

19
Q
  1. What is the command line utility used to display the IP configuration of your Windows computer?
  2. ifconfig
  3. net use network
  4. netconfig
  5. ipconfig
  6. netstat
A

ipconfig

20
Q
  1. When configuring a wireless access point to provide firewall services, which of the following are important configuration actions to take? (Select all that apply)
  2. Change the default administrator password
  3. Block unwanted ports
  4. Change the SSID
  5. Turn off SSID broadcasting
  6. Change the default IP address range
A
Change the default administrator password
Block unwanted ports
Change the SSID
Turn off SSID broadcasting
Change the default IP address range

ALL

21
Q
  1. In general, you should not accept any connections that originate from ___ your firewall.
A

outside

22
Q
  1. If your home firewall device is unable to block ports, use ___ instead to rout data to nonexistent hosts.
A

post forwarding

23
Q
  1. It is best to pick a firewall based on:
  2. Actual network security needs
  3. Recommendations of a salesperson
  4. The list of awards given the product
  5. The price
  6. Prominent advertisement
A

Actual network security needs

24
Q
  1. Appliance firewalls are only and always commercial firewalls.
    TRUE OR FALSE
A

FALSE

25
Q
  1. When selecting a firewall, especially a hardware firewall, never skimp on ____.
A

throughput