Question
Brianna is an IT technician. She is studying a threat that holds the communication channel open when a TCP handshake does not conclude. What kind
Brianna is an IT technician. She is studying a threat that holds the communication channel open when a TCP handshake does not conclude. What kind of attack does this involve?
Group of answer choices
Denial of service (DoS) attack
Hackers accessing information on a server
The interception of transaction data
Unauthorized persons breaching a server's document tree
Flag question: Question 2
Question 21 pts
Chang is a network engineer. He is revising the company's firewall implementation procedure. As part of this work, he is reviewing the procedural element requiring placement of network firewalls at chokepoints and mapping out the network structure to pinpoint the locations where firewalls are to be placed. Which of the following is he focusing on?
Group of answer choices
Firewall requirements
Network design
Change documentation
Journaling firewall deployment
Flag question: Question 3
Question 31 pts
A network infrastructure supervisor is designing a firewall placement strategy that will protect the organization's Internet-facing web and email servers and the internal network. Which design will best protect both?
Group of answer choices
Placing the firewall between the Internet and a single network hosting both the servers and the internal network, using port forwarding to direct traffic to the servers
Placing the web and email servers, configured with the latest patches and anti-malware applications, on the Internet in front of the firewall, while placing the internal network behind the firewall
Using a perimeter network design where all Internet traffic enters the firewall; one interface of the firewall connects to a perimeter network hosting the web and email servers, while the internal network receives traffic from a separate firewall interface
Using two firewalls to create a demilitarized zone (DMZ); one firewall is placed between the Internet and the servers, the other firewall is located behind the first firewall and the servers protecting the internal network
Flag question: Question 4
Question 41 pts
Which of the following is a concern when considering the use of a demilitarized zone (DMZ) firewall solution to access high-value data on an internal network?
Group of answer choices
Expense
Poorly constructed firewall rules
Poorly designed placement of firewalls on subnets
Virtual private network (VPN) server vulnerabilities
Flag question: Question 5
Question 51 pts
Tonya is redesigning her company's network infrastructure to accommodate rapid growth. Several departments are highly specialized. Tonya needs to allow Network News Transfer Protocol (NNTP) on some, but not all, subnets. Her budget is limited. Which of the following is the best solution?
Group of answer choices
Install firewalls at the demilitarized zone (DMZ) to filter packets by protocol, port, and destination subnet, and then perform port forwarding.
Install firewalls at each network segment with rules to filter specific traffic for each one as required.
Place existing routers capable of packet filtering at each subnet.
Configure the native firewall on each workstation to filter traffic based on the requirements for the subnet they're on.
Flag question: Question 6
Question 61 pts
Israel is a network technician who has just deployed a new firewall. Before putting it in production, he wants to test the firewall's ability to filter traffic according to its rule set, without risking the internal network. What is the best solution?
Group of answer choices
Place the firewall in a virtual network environment and simulate traffic.
Place the firewall outside the demilitarized zone (DMZ) with a production firewall behind it protecting the internal network.
Place the firewall outside the DMZ and use the tracert command.
Place the firewall within the DMZ and use the ping command.
Flag question: Question 7
Question 71 pts
Protecting computers, hard disks, databases, and other computer equipment attached directly or indirectly to the Internet can be categorized as which kind of security?
Group of answer choices
Application security
Hardware security
Network security
Transaction security
Flag question: Question 8
Question 81 pts
Which of the following is a firewall implementation best practice?
A. A single firewall model should be used for all firewall placements.
B. Different firewall products should be used depending on firewall placement, such as different products for border firewalls versus internal host firewalls.
C. Firewalls should be placed within the demilitarized zone (DMZ) to protect server and internal networks separately.
D. Host firewalls should be deployed as chokepoints.
Flag question: Question 9
Question 91 pts
A web server between two firewalls is considered to be in a _____ _____ (???).
(Answer using all lowercase letters. If you want to use the acronym, use all UPPERCASE letters.)
Flag question: Question 10
Question 101 pts
What type of firewall is pictured in the image?
(Answer using all lowercase letters)
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started