Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Brianna is an IT technician. She is studying a threat that holds the communication channel open when a TCP handshake does not conclude. What kind

Brianna is an IT technician. She is studying a threat that holds the communication channel open when a TCP handshake does not conclude. What kind of attack does this involve?

Group of answer choices

Denial of service (DoS) attack

Hackers accessing information on a server

The interception of transaction data

Unauthorized persons breaching a server's document tree

Flag question: Question 2

Question 21 pts

Chang is a network engineer. He is revising the company's firewall implementation procedure. As part of this work, he is reviewing the procedural element requiring placement of network firewalls at chokepoints and mapping out the network structure to pinpoint the locations where firewalls are to be placed. Which of the following is he focusing on?

Group of answer choices

Firewall requirements

Network design

Change documentation

Journaling firewall deployment

Flag question: Question 3

Question 31 pts

A network infrastructure supervisor is designing a firewall placement strategy that will protect the organization's Internet-facing web and email servers and the internal network. Which design will best protect both?

Group of answer choices

Placing the firewall between the Internet and a single network hosting both the servers and the internal network, using port forwarding to direct traffic to the servers

Placing the web and email servers, configured with the latest patches and anti-malware applications, on the Internet in front of the firewall, while placing the internal network behind the firewall

Using a perimeter network design where all Internet traffic enters the firewall; one interface of the firewall connects to a perimeter network hosting the web and email servers, while the internal network receives traffic from a separate firewall interface

Using two firewalls to create a demilitarized zone (DMZ); one firewall is placed between the Internet and the servers, the other firewall is located behind the first firewall and the servers protecting the internal network

Flag question: Question 4

Question 41 pts

Which of the following is a concern when considering the use of a demilitarized zone (DMZ) firewall solution to access high-value data on an internal network?

Group of answer choices

Expense

Poorly constructed firewall rules

Poorly designed placement of firewalls on subnets

Virtual private network (VPN) server vulnerabilities

Flag question: Question 5

Question 51 pts

Tonya is redesigning her company's network infrastructure to accommodate rapid growth. Several departments are highly specialized. Tonya needs to allow Network News Transfer Protocol (NNTP) on some, but not all, subnets. Her budget is limited. Which of the following is the best solution?

Group of answer choices

Install firewalls at the demilitarized zone (DMZ) to filter packets by protocol, port, and destination subnet, and then perform port forwarding.

Install firewalls at each network segment with rules to filter specific traffic for each one as required.

Place existing routers capable of packet filtering at each subnet.

Configure the native firewall on each workstation to filter traffic based on the requirements for the subnet they're on.

Flag question: Question 6

Question 61 pts

Israel is a network technician who has just deployed a new firewall. Before putting it in production, he wants to test the firewall's ability to filter traffic according to its rule set, without risking the internal network. What is the best solution?

Group of answer choices

Place the firewall in a virtual network environment and simulate traffic.

Place the firewall outside the demilitarized zone (DMZ) with a production firewall behind it protecting the internal network.

Place the firewall outside the DMZ and use the tracert command.

Place the firewall within the DMZ and use the ping command.

Flag question: Question 7

Question 71 pts

Protecting computers, hard disks, databases, and other computer equipment attached directly or indirectly to the Internet can be categorized as which kind of security?

Group of answer choices

Application security

Hardware security

Network security

Transaction security

Flag question: Question 8

Question 81 pts

Which of the following is a firewall implementation best practice?

A. A single firewall model should be used for all firewall placements.

B. Different firewall products should be used depending on firewall placement, such as different products for border firewalls versus internal host firewalls.

C. Firewalls should be placed within the demilitarized zone (DMZ) to protect server and internal networks separately.

D. Host firewalls should be deployed as chokepoints.

Flag question: Question 9

Question 91 pts

A web server between two firewalls is considered to be in a _____ _____ (???).

(Answer using all lowercase letters. If you want to use the acronym, use all UPPERCASE letters.)

Flag question: Question 10

Question 101 pts

What type of firewall is pictured in the image?

(Answer using all lowercase letters)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Microsoft Visual Basic 2005 For Windows Mobile Web Office And Database Applications Comprehensive

Authors: Gary B. Shelly, Thomas J. Cashman, Corinne Hoisington

1st Edition

0619254823, 978-0619254827

More Books

Students also viewed these Databases questions