Question:* What firewall based technology would you use to create a secure tunnel connection from a corporate headquarters to a remote branch office?
Answer: • VPN
Question:* A stateful firewall maintains which of the following?
Answer: • state table
Question:* Which of the folllowing firewalls keeps track of the state of network connections ?
Answer: • Stateful inspection
Question:* You want to filter all traffic going to an internal web server from the Internet side of the firewall, what port will you filter on the firewall?
Answer: • 80
Question:* Your customer asks you to allow ALL hosts from the Internet to company's secure webserver (Secure HTTP), what port do you open on the firewall?
Answer: • 443
Question:* Which of the following is not a recognized generation of Firewall?
Answer: • DMZ
Question:* Which TCP port is used by Telnet?
Answer: • 23
Question:* Which of the following server creates a secure tunnel connection?
Answer: • VPN
Question:* What is the primary purpose of a firewall?
Answer: • Inspect packets
Question:* Which of the following 8-bit values identifies the maximum time the packet can remain in the system before it is dropped?
Answer: • time to live
Question:* FTP uses which of the following port as control port?
Answer: • 21
Question:* What is a DMZ zone?
Answer: • DeMilitarized Zone
Question:* Which of the following is TRUE?
Answer: • All of the given options are correct
Question:* In an IP packet header, which of the following is the address of the computer or device that is to receive the packet?
Answer: • destination address
Question:* What device logically filters traffic at the edge of a computer network and the Internet?
Answer: • Firewall
Question:* You are a network administrator and you have been asked to add a deny all ICMP firewall stated that is sourced from the Internet; you add a deny all for ICMP, what common command would you use to test your newly added rule?
Answer: • PING
Question:* Which of the following firewalls works at the application level?
Answer: • application-level firewalls
Question:* Your client asks you to create a rule for FTP access, what port(s) will you add on the firewall?
Answer: • 20 and 21
Question:* What port does FTP use for the control port?
Answer: • 21
Question:* Which port does secure HTTP use?
Answer: • 443
Question:* Some firewalls deploy a technology that allows monitoring of traffic in and out of a network and alerts network staff when suspicious traffic patterns occur.
Answer: • IDS
Question:* The Windows based program, ZoneAlarm is an example of a "BLANK" firewall?
Answer: • Software
Question:* When referring to firewall concepts, what are application level gateways?
Answer: • Proxy servers
Question:* Which of the following firewalls keeps track of the connection state?
Answer: • Stateful packet filtering firewall
Question:* Which of the following is not a VALID basic criteria for rule in the firewall policy?
Answer: • User
Question:* Packets contain an 8-bit value that determines the maximum time the packet can remain the CPU, Memory, and Buffer circuits of a firewall before it is dropped or discarded, what is this called?
Answer: • Time To Live
Question:* When designing a network that consists of a firewall, the firewall design needs to be "BLANK" so that it can grow with the network it protects.
Answer: • Scalable
Question:* What application controls what information is transmitted or received from an external source destined to a server, workstation, or computer that is based on a preset of rules and/or user preferences?
Answer: • Firewall
Question:* What is a host based firewall?
Answer: • Software firewall installed on a server/workstation/desktop
Question:* When referring to firewalls, what does SPI Stand for?
Answer: • Stateful Packet Inspection
Question:* What types of firewalls are able to analyze the contents of packets and the IP headers for signs that the traffic is legitimate?
Answer: • Stateful
Question:* Which of the following valid OSI layer are covered by packet filtering firewall operation ?
Answer: • Both Transport layer and Network layer
Question:* Which of the following is another term for a packet of digital information?
Answer: • datagram
Question:* When packets are being processed by a hardware firewall, one of the several steps in processing the packets is an error-checking procedure that is performed in the trailer section of an IP Packet, this is called what?
Answer: • CRC
Question:* The practice of designing operational aspects of a system to work with a minimal amount of system privilege is called:
Answer: • least privilege
Question:* Which type of firewall involves firewall software installation directly on the user's system?
Answer: • Residential –Grade Firewall
Question:* What main attributes are used at layer 4 of the OSI model to filter traffic on a firewall?
Answer: • Source and/or destination TCP/UDP ports
Question:* Ports up to which of the following are called well-known ports?
Answer: • 1023
Question:* Which particular firewall usually consists of two separate firewall devices?
Answer: • Hybrid Firewall
Question:* Zone Alarm is an example of which type of firewall?
Answer: • personal
Question:* When troubleshooting the flow of packets through a firewall, a datagram is called what at the network layer of the OSI model?
Answer: • Packets
Question:* Which of the following are the most common restrictions implemented in packet filtering firewalls?
Answer: • All of the given options are valid
Question:* What port do most DDOS DNS attacks occur on?
Answer: • 53
Question:* What it is called when a packet arrives at a firewall, gets analyzed and determines that no connection exists and the packet is dropped?
Answer: • Stateful Packet Inspection
Question:* When configuring a firewall to deny port 3389 to a RDP server that is to receive the SYN packet, what is the address?
Answer: • Destination
Question:* What happens when a packet arrives on an interface and a route exists in the local routing table and the firewall routes the packet back out the same interface the packet arrived on?
Answer: • The Packet is dropped
Question:* The basic concept of a SYN flooding attack lies in the design of what handshake that begins a TCP connection?
Answer: • 3-way
Question:* True/False: Application proxy firewalls are faster than Stateful Packet Inspection firewalls.
Answer: • False
Question:* Which of the following firewall makes the filtering decision based on the media access control address of the source/destination of a packet ?
Answer: • MAC layer Firewalls
Question:* What kind of firewall is the opensource IPtables firewall commonly found on Linux Distros?
Answer: • Stateful
Question:* Which particular generation firewall are stateless in nature ?
Answer: • First Generation
Question:* What specific chip design allows firewalls to accelerate packet processing to analyze and filter packets between an untrusted and trusted network?
Answer: • ASIC
Question:* Ports up to "BLANK" are considered well known ports.
Answer: • 1023
Question:* What technology is used on firewalls that process stateful packet inspections at the hardware level and as close to the line rate as possible?
Answer: • ASIC
Question:* What kind of firewall is the integrated Microsoft Windows firewall application?
Answer: • Stateful
Question:* What device should be the front line defense in your network?
Answer: • Stateful Packet Inspection firewall
Question:* A Stateful Packet Inspection firewall maintains a "BLANK", which is also just a list of active connections.
Answer: • State Table
Question:* True/False: NAT is considered as a firewall technology.
Answer: • False
Question:* Which of the following firewall's filtering process can be either Stateful, Stateless or both ?
Answer: • Packet Filtering
Question:* What do circuit layer Firewalls monitor?
Answer: • TCP Handshaking
Question:* Network-based firewalls and Host-based firewalls are valid categories of which of the following firewall ?
Answer: • Application –level firewall
Question:* Which of the following is not a VALID subset of packet filtering firewalls?
Answer: • Stateless inspection
Question:* A dynamic or Stateful Packet Inspection firewall maintains active "BLANK" sessions and "BLANK" pseudo sessions.
Answer: • TCP and UDP
Question:* A "BLANK" flowing through a firewall is another term for a packet of digital information.
Answer: • Datagram
Question:* Which of the following is not a VALID processing –mode category of firewalls?
Answer: • Proxy firewalls
Question:* In an IP packet header, which of the following describes the length of the header in 32-bit words and is a 4-bit value?
Answer: • Internet header length
Question:* Which generation firewalls are stateful inspection firewalls?
Answer: • Third Generation
Question:* Which of the following servers in the DMZ needs only list a limited number of public IP addresses?
Answer: • DNS
Question:* What is a Cisco Access Control List (ACL) considered as?
Answer: • Stateless
Question:* Which of the following is FALSE about Circuit Gateways?
Answer: • Circuit Gateway firewalls provide a unique access mechanism based on the destination application
Question:* Which of the following is a mechanism designed into operating system kernel ?
Answer: • Fifth Generation
Question:* What layer(s) does an SPI firewall generally operate at?
Answer: • D and F
Question:* Which of the following can have different components of the firewall for different systems?
Answer: • Screened Host Firewalls
Question:* Which of the following is not a vaild categorization of Firewall based on processing mode?
Answer: • Application filtering
Question:* Which of the following host is sometimes called a dual-homed gateway or bastion host?
Answer: • sceened
Question:* What layer of the OSI model do Circuit Layer Firewalls operate at?
Answer: • Session Layer
Question:* Which of the following is not a vaild categorization of Firewall based on structure?
Answer: • application-based
Question:* Which level proxy provides protection at the session layer of OSI?
Answer: • circuit
Question:* Which generation firewalls are either application-level firewalls or proxy servers?
Answer: • Second generation
Question:* Which of the following is an INVALID common architectural implementation of firewall?
Answer: • Dynamic Filtering
No comments:
Post a Comment