Question
Flag Question. Question 1 Which of the following best describes a network chokepoint? A. A load balancing system that acts as a funnel point for
Flag Question. Question 1
Which of the following best describes a network chokepoint?
A. A load balancing system that acts as a funnel point for traffic, that is an ideal place to enforce policy, and that is done through the firewall
B. A specialized kind of gateway that focuses on traffic to a single concentrated pathway to streamline the process of filtering
C. A device that analyzes traffic based on destination address
D. A proxy installed between a firewall and a web server
Flag question: Question 2
What prevents firewall filtering?
A. Authentication
B. Session length
C. Encryption
D. Remote access
Flag question: Question 3
Hao is a network security engineer for a mid-sized company. She is redesigning the infrastructure and its resources to provide greater protection from both external and internal threats. She wants to place firewall devices not only where the local area network (LAN) connects to the Internet, but also within the network. Although she doesn't suspect any employees of misusing computer resources, there is always the potential that one might send unauthorized emails or other messages containing confidential company information to a competitor. Which redundant solution should she select that will be most likely to detect malicious behavior by an internal employee?
A. Firewall in the demilitarized zone (DMZ)
B. Firewalls at each subnet
C. Host firewalls
D. Host firewalls and firewalls at each subnet
Flag question: Question 4
Geraldine is a freelance network technician. She has been hired to design and build a small office/home office (SOHO) network. She is considering what firewall solution to select, keeping in mind that her client has a tight budget and the network is made up of no more than six nodes. Which of the following is the best solution?
A. Next-generation firewall
B. Commercial software firewall
C. Personal hardware firewall integrated in the wireless access point or modem
D. Commercial hardware firewall
Flag question: Question 5
Jae is a network consultant hired by a small business client. He has been asked to recommend a firewall solution. Given the relatively small size of the infrastructure, he suggests a firewall that provides integrated intrusion detection system/intrusion prevention system (IDS/IPS) functionality because a single device offering multiple functions is cost- and space-effective. What is the solution?
A. Commercial software firewall
B. Appliance firewall
C. Next-generation firewall (NGFW)
D. Virtual firewall
Flag question: Question 6
Rachel is a network technician. She is writing a proposal that recommends which firewall type to purchase to replace an aging and failing unit. She wants to be able to protect two separate internal network segments with one hardware firewall. What is her recommendation?
A. Dual-homed
B. Next-generation
C. Triple-homed
D. Virtual
Flag question: Question 7
A _____ _____ firewall stands guard along the pathway of potential attack, positioned to take the brunt of any attack.
(Answer using all lowercase letters).
Flag question: Question 8
_____ threats are those you must seek out to be harmed, such as visiting a malicious website.
(Answer using all lowercase letters).
Flag question: Question 9
Windows Defender Firewall is an example of a _____ firewall.
(Answer using all lowercase letters).
Flag question: Question 10
A firewall with two interfaces is known as a __________ firewall.
(Answer using all lowercase letters).
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started