networking2 Flashcards

1
Q

Linux stores passwords in the ____ file in encrypted format.
a. /etc/pass c. /etc/passwd
b. /root/passwd d. /system/password

A

/etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Public-Key Infrastructure (PKI) must be used for ____ authentication.
a. Kerberos c. RADIUS
b. 802.1x Wi-Fi d. certificate-based

A

certificate-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In ____________________-based access controls, access is granted based on a set of rules specified by the central authority.

A

ANS: rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___________ is the act of confirming the identity of a potential user.

A

ANS: Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

With ____________________ authentication, the firewall enables the authenticated user to access the desired resources for a specific period of time.

A

ANS: client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____________________ IP address mappings work best because some TACACS+ systems use the source IP address to create the encryption key.

A

ANS: Static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The ____________________ password system, which is a feature of the Linux operating system that enables the secure storage of passwords, stores them in another file that has restricted access.

A

ANS: shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MATCHING CHAPTER 3

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A firewall is designed to prevent all attackers, viruses, and would-be intruders from entering a computer or computer network. T/F

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mobile devices such as laptops, PDAs, and smartphones blur the perimeter boundary. T/F

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A properly configured firewall only allows authorized connection attempts to the ports on the network it protects.
T/F

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A packet-filtering firewall installed on a TCP/IP-based network typically functions at the TCP level. T/F

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application-layer gateways can control the way applications inside the network access external networks by setting up proxy services. T/F

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewalls provide ____ services by examining packet headers and allowing traffic that conforms to estalished rules to continue.
a. packet filtering c. application proxy
b. NAT d. TCP/IP

A

a. packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Firewalls can be used to host ____ to reduce server load and improve Web-site performance.
a. logging c. VPN
b. shielding hosts d. cached data

A

d. cached data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A firewall may also help prevent some Trojan horses from leveraging the local network through unauthorized service ports called ____.
a. back doors c. perimeters
b. apPlication proxies d. content locks

A

a. back doors

17
Q

Network perimeters may be blurred by ____.
a. VPNs c. Web sites
b. intranets d. desktop computers

A

a. VPNs

18
Q

A ____ firewall enables you to log passing traffic, protecting the whole network at one time.
a. stateful c. perimeter
b. stateless d. DMZ

A

c. perimeter

19
Q

A network that needs to connect to the Internet might have a ____ host and a service network.
a. walled c. packet
b. mail d. bastion

A

d. bastion

20
Q

Ports numbers range from 0 to ____.
a. 1024 c. 65,535
b. 3999 d. 786,568

A

c. 65,535

21
Q

The combination of a sender’s full address (network address plus port) and receiver’s address (network address plus port) makes up a ____.
a. socket c. bastion
b. packet d. DMZ

A

a. socket

22
Q

A firewall can act as a(n) ____ server that makes high-level application connections on behalf of internal hosts and other machines.
a. proxy c. HTTP
b. forward d. outbound

A

a. proxy

23
Q

____ are commonly used to connect two companies networks over the Internet in a site-to-site configuration.
a. Bastion hosts c. Proxy servers
b. VPNs d. Stateful proxies

A

b. VPNs

24
Q

In the OSI model, level 1 is the ____ layer.
a. physical c. transport
b. data link d. application

A

a. physical

25
Q

Application gateways function at the ____ layer of the OSI model.
a. presentation c. network
b. transport d. data link

A

a. presentation

26
Q

Packet-filtering firewalls examine every incoming packet _____ and can selectively filter packets.
a. transport c. header
b. session d. data

A

c. header

27
Q

A ____ contains the source’s IP and port as well as the destination’s IP and port, and it also provides information on the total time in seconds, the time remaining in seconds, and the protocol used (UDP or TCP).
a. state table c. datagram
b. packet header d. TCP table

A

a. state table

28
Q

____ breaks a message into numbered segments so that it can be transmitted. It then reassembles the message when it reaches the destination computer.
a. TCP/IP c. IP filtering
b. UDP d. TCP filtering

A

b. UDP

29
Q

To someone on the Internet or another outside network, it appears that all information is coming from a single computer when ____ is used.
a. PAT c. VPN
b. NAT d. IETF

A

a. PAT

30
Q

____ firewalls can be used to perform load balancing.
a. Application gateway c. Stateless
b. Stateful d. NAT

A

a. Application gateway

31
Q

Most firewalls fall into the ____ category.
a. application gateway c. MAC layer
b. packet-filter d. hybrid

A

d. hybrid

32
Q

Third-generation, stateful inspection firewalls monitor network connections between internal and external systems using ____.
a. rules sets c. state tables
b. stateless protocols d. SQL databases

A

c. state tables

33
Q

When the ____ architectural approach is used, the bastion host contains two NICs (network interface cards) rather than one, as in the bastion host configuration.
a. screened subnet c. packet-filtering router\
b. screened host d. dual-homed host

A

d. dual-homed host

34
Q

A(n) ____________________ is an extended network that shares part of an organization’s network with third parties.

A

ANS: extranet

35
Q

Port numbers come in two flavors: well-known ports and ____________________ ports.

A

ANS: ephemeral

36
Q

The OSI networking model has ____________________ layers.

A

ANS:
seven
7

37
Q

____________________ inspection blocks packets that are sent from an external computer that does not have a currently active connection to an internal computer.

A

ANS: Stateful

38
Q

“____________________” refers to the era of technology a firewall evolved in.

A

ANS: Generation

39
Q

MATCHING CHAPTER 4

A