Lesson 11 Flashcards
Firewall
A host-based or network-based device that filters inbound and outbound traffic. Firewalls use rules to define the filters.
Perimeter network
An area between the Internet and an intranet hosting resources available to any Internet users.
Proxy server
A server that acts as on behalf of private clients to retrieve web pages from the Internet. Proxy servers include NAT, can cache requests, filter requests, and check some of the retrieved web page’s content. A reverse proxy isolates web servers from direct access on the Internet by receiving requests from Internet clients and forwarding them to the web server.
An organization wants to restrict which web pages employees can access on the Internet using company computers. What should be implemented?
Proxy server
What is the basic function of a firewall?
To protect a network from unauthorized access
What is the default security level for Local Intranet in Internet Explorer Security Zones?
Medium-low
What allows computers to locate each other in a Microsoft network?
Network discovery
Which network security zone represents the highest risk?
Internet
How many firewalls are used to create a perimeter network? (Choose all that apply.)
One
Two
True or false. A DMZ provides a layer of security for Internet-facing servers.
True
Which of the following includes all external Web sites that are not listed in the Restricted or Trusted Sites zone?
Internet security zone
Which of the following is used to separate an internal network from the internet?
Firewall
John works as a Network Administrator for uCertify Inc. The employees of the company frequently use the Internet and make the company’s resources susceptible to attacks from unauthorized access. Which of the following will John use in order to protect the company’s network from unauthorized access?
Firewall
Click on the area where you will find the options to edit the Inbound rule of a firewall.
System and Security
A user Sam on the intranet is trying to access ucertify.com via the router. Choose and reorder the actions that Network Address Translation (NAT) will take to accomplish the task.
- It receives the request and logs the source and destination IP address and port in an internal table.
- It creates a new packet to forward the request to ucertify.com.
- It changes the source IP address to its own public IP address and the source port to an unused port.
- It sends the request to ucertify.com. ucertify.com returns the web page to the NAT server.
- It looks at the source port and compares it to its internal NAT table and sends the page back to Sam’s computer.