Question
1. Charles is an IT help desk technician. He gets a ticket from a branch office saying that they lost Internet connectivity. He investigates remotely
1. Charles is an IT help desk technician. He gets a ticket from a branch office saying that they lost Internet connectivity. He investigates remotely over a backup maintenance link and determines that this was done by design; the office's firewall deliberately severed the connection. Which of the following does this functionality define?
A. | Stateful inspection
| |
B. | Reverse proxy
| |
C. | Bastion host
| |
D. | Port forwarding
|
2. Content filtering can focus on domain name, URL, filename, file extension, or keywords in the content of a packet.
True
False
3. Rupesh is a network technician who has been tasked by his supervisor to configure the edge firewall of an office branch. His task is to focus on outbound traffic based on several factors, such as domain name, URL, file extension, and certain keywords. What is he configuring the firewall to perform?
A.Stateful inspection
B.Stateless inspection
C.Blocking
D.Content filtering
4. Logan is a network administrator. He is considering a firewall purchase for a branch office being built by his company. Above all other considerations, the design requires a device capable of a high degree of imposing user access restrictions. What is this called?
A. | Audit capacities
| |
B. | Security assurance
| |
C. | Privilege control
| |
D. | Authentication
|
5. A firewall serves as a clear and distinct boundary between one network area and another.
True or False?
6. Malika is a network engineer who is configuring firewalls separating both the Accounting and HR departments from the rest of the business divisions on the local area network (LAN). She wants to allow only certain traffic into those subnets from both internal employees and those working from home. The traffic may include email, chat, and video conferencing. She wants to prevent access to the company intranets to protect confidential employee and financial data. How has she configured these firewalls?
A. | Filter
| |
B. | Sieve
| |
C. | Examiner
| |
D. | Blocker
|
7. Shamika is a networking student who has just moved into a small house with two other roommates. She has purchased a new DSL modem and is planning on configuring the built-in firewall. She needs to change the default username and password for the device first. What is her concern?
A. | The default username and password are likely available on the Internet and anyone could use those credentials to hack into the modem and access the home network.
| |
B. | She will be unable to configure the firewall until those temporary default credentials have been changed.
| |
C. | She is being overly cautious, as home networks are a low priority for hackers.
| |
D. | The DSL company has those credentials and could use them to monitor her network communications.
|
8. Delmar is a consultant configuring a small firewall for a client who uses a small office/home office (SOHO) network. He is permitting the common protocols on the outbound connection, but he can only forward rather than block incoming protocols. If he forwards common protocols such as FTP, Telnet, and NetBIOS, how can this protect the network from anyone who may maliciously use these ports?
A. | Forward to port 3074, which is used by Xbox since it is not a workstation
| |
B. | Forward to a nonexistent port where no device is listening
| |
C. | Forward to ports 81 and 82, which are overflows for port 80 and have no valid use
| |
D. | Forward to the IP address and port on the last computer in the network, which is set up for just such a purpose
|
9. Hao is a network security engineer for a mid-sized company. She is redesigning the infrastructure and its resources to provide greater protection from both external and internal threats. She wants to place firewall devices not only where the local area network (LAN) connects to the Internet, but also within the network. Although she doesn't suspect any employees of misusing computer resources, there is always the potential that one might send unauthorized emails or other messages containing confidential company information to a competitor. Which redundant solution should she select that will be most likely to detect malicious behavior by an internal employee?
A. | Host firewalls
| |
B. | Firewall in the demilitarized zone (DMZ)
| |
C. | Host firewalls and firewalls at each subnet
| |
D. | Firewalls at each subnet
|
10. Augustine is a network engineer for a mid-sized company. He needs to deploy a new firewall, which was expensive to purchase and is complex to configure. In preparation for installation and configuration, he attends training conducted by the firewall vendor. Which of the following types of firewalls is he most likely planning to install?
A. | Commercial
| |
B. | Appliance
| |
C. | Personal
| |
D. | Native
|
11. A firewall is a filtering device that watches for traffic that fails to comply with rules defined by the firewall administrator. What does the firewall inspect?
A. | Packet latency
| |
B. | Packet encryption
| |
C. | Packet header
| |
D. | Packet trailer
|
12. A bastion host firewall stands guard along the pathway of potential attack, positioned to take the brunt of any attack.
True
False
13. Marcus is studying networking with an emphasis on cybersecurity at a local university. As part of his research, he wants to visit certain hacker sites but is concerned that his laptop would be vulnerable to passive threats while visiting them. He doesn't have the funds for expensive security equipment. What is the least expensive option he has at hand?
A. | Native firewall
| |
B. | Passive firewall
| |
C. | Secure firewall
| |
D. | Active firewall
|
14. The sole use of ingress and egress filtering is to eliminate spoofing.
True
False
15. A software firewall can protect multiple hosts from malicious network activity.
True
False
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Here are the answers to your questions 1 Charles is an IT help desk technician He gets a ticket from a branch office saying that they lost Internet connectivity He investigates remotely over a backup ...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started