In: Computer Science
Question 2
4-14 Which of the following terms best describes the following diagram?
Question 2 options:
DMZ |
|
Intranet |
|
Public LAN |
|
Extranet |
Question 3
4-13 Which of the following is the BEST definition of dual-homed?
Question 3 options:
Can filter on two OSI layers |
|
Contains two NICs |
|
Performs filtering and logging |
|
Performs packet and content filtering |
Question 4
4-10 Which of the following is the name for a lower-end (small business grade) firewall appliance that is capable of packet filtering, content filtering, intrusion detection, proxy, and application layer filtering?
Question 4 options:
UTM |
|
All-in-one |
|
SMB device |
|
NGFW |
Question 5
4-11 Which of the following is most often used for protecting a single computer?
Question 5 options:
hardware firewall |
|
virtual firewall |
|
software firewall |
|
firewall appliance |
Question 6
4-7 Which of the following were generation one firewalls capable of?
Question 6 options:
Filtering by IP header |
|
Filtering by session layer header |
|
Filtering by data content |
|
Filtering by protocol being used |
Question 7
4-6 the earliest firewalls were only capable of which of the following kinds of filtering?
Question 7 options:
Application layer |
|
Stateless |
|
Stateful |
|
Circuit layer |
Question 8
4-1 Which of the following were firewalls originally conceived to perform?
Question 8 options:
Block incoming unsolicited traffic |
|
Block outgoing traffic |
|
Both of the above |
|
Neither of the above |
Question 9
4-8 Which of the following is the word describing a firewall that is aware of a packet's place in an established and ongoing conversations
Question 9 options:
Content filter |
|
Proxy |
|
Stateless |
|
Stateful |
Question 10
4-20 Which of the following refers to a software firewall places on a dedicated server to create an internal hardware firewall?
Question 10 options:
Firewall system |
|
Constructed firewall |
|
Spare part firewall (SPF) |
|
Virtual firewall |
Solution -
Quesion 2 - Diagram not given
Question 3 - Contains two NICs
Explanation - In firewalls, dual homed host is a system that is fitted with two Network Interaces(NICs) for providing secure access.
Question 4 - UTM
Explanation - UTM ( Unified Threat management ) is capable of packet filtering, content filtering, intrusion detection, proxy, and application layer filtering.
Question 5 - software firewall
Explanation - software firewall is most often used on individual computers whereas hardware firewalls require expert setup.
Question 6 - Filtering by protocol being used
Explanation - generation one firewalls inspect source IP address,destination IP address,source and destination ports,and protocol like TDP,UDP etc to filter the traffic.
Question 7 - Stateless
Explanation - the earliest firewalls were only capable stateless filtering that uses some predetermined rules to filter and they store no information on connection state.
Question 8 - Block incoming unsolicited traffic
Explanation - firewalls were originally conceived to block all unwanted incoming traffic.
Question 9 - Stateful
Explanation - Stateful firewall moniters the full state of the active network connections and is constantly analyzing the complete context of traffic and data packets.
Question 10 - Virtual firewall
Virtual firewall refers to a software firewall places on a dedicated server to create an internal hardware firewall.