Lesson 11 Flashcards

1
Q

Firewall

A

A host-based or network-based device that filters inbound and outbound traffic. Firewalls use rules to define the filters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Perimeter network

A

An area between the Internet and an intranet hosting resources available to any Internet users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Proxy server

A

A server that acts as on behalf of private clients to retrieve web pages from the Internet. Proxy servers include NAT, can cache requests, filter requests, and check some of the retrieved web page’s content. A reverse proxy isolates web servers from direct access on the Internet by receiving requests from Internet clients and forwarding them to the web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An organization wants to restrict which web pages employees can access on the Internet using company computers. What should be implemented?

A

Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the basic function of a firewall?

A

To protect a network from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the default security level for Local Intranet in Internet Explorer Security Zones?

A

Medium-low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What allows computers to locate each other in a Microsoft network?

A

Network discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which network security zone represents the highest risk?

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How many firewalls are used to create a perimeter network? (Choose all that apply.)

A

One

Two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or false. A DMZ provides a layer of security for Internet-facing servers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following includes all external Web sites that are not listed in the Restricted or Trusted Sites zone?

A

Internet security zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is used to separate an internal network from the internet?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

John works as a Network Administrator for uCertify Inc. The employees of the company frequently use the Internet and make the company’s resources susceptible to attacks from unauthorized access. Which of the following will John use in order to protect the company’s network from unauthorized access?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Click on the area where you will find the options to edit the Inbound rule of a firewall.

A

System and Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A user Sam on the intranet is trying to access ucertify.com via the router. Choose and reorder the actions that Network Address Translation (NAT) will take to accomplish the task.

A
  1. It receives the request and logs the source and destination IP address and port in an internal table.
  2. It creates a new packet to forward the request to ucertify.com.
  3. It changes the source IP address to its own public IP address and the source port to an unused port.
  4. It sends the request to ucertify.com. ucertify.com returns the web page to the NAT server.
  5. It looks at the source port and compares it to its internal NAT table and sends the page back to Sam’s computer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name the proxy server functionalities whose descriptions are given in the following figure.

A

Caching
Content Checking
Filtering

17
Q

Which of the following is used to encrypt and authenticate packets?

A

IPSec

18
Q

Which of the following security zones is internal to the company, as well as closest to its internal network?

A

Intranet

19
Q

Identifying types of firewall

A

Proxy firewall: Examines the data and decides whether the requests should be forwarded or refused
Packet filter firewall: Blocks traffic to specific addresses, depending on the type of application
Stateful inspection firewall: Tracks the state of every network communication channel and records it in a state table

20
Q

Spot the extranet network

A

Private Connection or VPN on Internet image