L11 - Firewalls Flashcards

1
Q

A firewall can stop hackers from breaking into your system

a) True
b) False

A

a) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A firewall can stop internet traffic that appears to be from a legitimate source

a) True
b) False

A

b) False

Firewalls are designed to allow traffic from legitimate sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A firewall can stop viruses and worms that spread through the internet

a) True
b) False

A

a) True

Firewalls can use virus and worm traffic from previous knowledge (high traffic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A firewall can stop spyware being put on your system

a) True
b) False

A

b) False

This is hard to stop because spyware can steal info and send it to a legitimate-looking site (not known to be malicious) and has low traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A firewall can stop viruses and worms that are spread through email

a) True
b) False

A

b) False

Firewalls can’t check contents of email itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware can disable Software Firewalls

a) True
b) False

A

a) True

If malware can get into OS, it will have privilege to disable software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware can disable Hardware Firewalls

a) True
b) False

A

b) False

Malware cannot control hardware settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware can disable Antivirus checkers

a) True
b) False

A

a) True

If malware can get into OS, it will have privilege to disable software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewalls can stop/control Pings

a) True
b) False

A

a) True

Firewall can look at the IP header block it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewalls can stop/control Packet Sniffing

a) True
b) False

A

b) False

At this point, the malware is already in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Firewalls can stop/control Outbound network traffic

a) True
b) False

A

a) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In order for a fragmented packet to be successfully reassembled at the destination, each fragment must not share a common fragment identification number

a) True
b) False

A

b) False

Each fragment of the same IP packet must share the same identification number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In order for a fragmented packet to be successfully reassembled at the destination, each fragment must say what its place or offset is in the original unfragmented packet

a) True
b) False

A

a) True

Otherwise we cannot correctly reassemble the fragments into the original IP packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In order for a fragmented packet to be successfully reassembled at the destination, each fragment must tell the length of the data carried in the fragment

a) True
b) False

A

a) True

This helps correctly reassemble the fragments into the original IP packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In order for a fragmented packet to be successfully reassembled at the destination, each fragment does not need to know whether more fragments follow this one

a) True
b) False

A

b) False

Each fragment must know if there are more fragments to follow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A packet filtering firewall is typically configured to filter packets going in both directions

a) True
b) False

A

a) True

17
Q

A prime disadvantage of an application-level gateway is the additional processing overhead on each connection

a) True
b) False

A

a) True

18
Q

A packet filtering firewall can decide if the current packet is allowed based on another packet that it has just examined

a) True
b) False

A

b) False

19
Q

A stateful inspection firewall needs to keep track of information of an active connection in order to decide on the current packet

a) True
b) False

A

a) True

20
Q

A company has a conventional firewall in place on its network. Which of these situations requires an additional personal firewall?

a) An employee uses a laptop on the company network and at home
b) An employee uses a desktop on the company network to access websites worldwide
c) A remote employee uses a desktop to create a VPN on the company’s secure network
d) None of the above, in each case the employee’s computer is protected by the company firewall

A

A and C

a) An employee uses a laptop on the company network and at home
c) A remote employee uses a desktop to create a VPN on the company’s secure network

21
Q

Typically the systems in the _____ require or foster external connectivity such as a corporate website, and email server, or a DNS server

a) DMZ
b) IP protocol field
c) Boundary firewall
d) VPN

A

a) DMZ

22
Q

A ____ configuration involves stand-alone firewall devices plus host-based firewalls working together under a central administrative control

a) packet filtering firewall
b) distributed firewall
c) boundary firewall
d) VPN

A

b) distributed firewall