Answered step by step
Verified Expert Solution
Link Copied!

Question

...
1 Approved Answer

Question 1 Firewalls fall into several major categories of processing modes: packet - filtering firewalls, application layer proxy firewalls, media access control layer firewalls, and

Question 1
Firewalls fall into several major categories of processing modes: packet-filtering firewalls, application layer proxy firewalls, media access control layer firewalls, and hybrids.
Group of answer choices
True
False
Question 2
A firewall cannot be deployed as a separate network containing a number of supporting devices.
Group of answer choices
True
False
Question 3
Using an application layer firewall means the associated Web server must be exposed to a higher level of risk by placing it in the DMZ.
Group of answer choices
True
False
Question 4
All organizations with a router at the boundary between the organizations internal networks and the external service provider will experience improved network performance due to the complexity of the ACLs used to filter the packets.
Group of answer choices
True
False
Question 5
A content filter, also known as a reverse firewall, is a network device that allows administrators to restrict access to internal content from external users.
Group of answer choices
True
False
Question 6
Even if Kerberos servers are subjected to denial-of-service attacks, a client can still request additional services.
Group of answer choices
True
False
Question 7
Most current operating systems require specialized software to connect to VPN servers, as support for VPN services is no longer built into the clients.
Group of answer choices
True
False
Question 8
_____ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.
Group of answer choices
a) MAC layer
b) Application Gateway
c) Circuit gateway
d) Packet-filtering
Question 9
_____ filtering requires that the firewall's filtering rules for allowing and denying packets are manually developed and installed with the firewall.
Group of answer choices
a)Dynamic
b) Stateless
c) Stateful
d) Static
Question 10
The proxy server is often placed in an unsecured area of the network or is placed in the _____ zone.
Group of answer choices
a) Internal/trusted Network
b) Hot
c) Demilitarized
d) Cold
Question 11
Known as the ping service, _____is a common method for hacker reconnaissance and should be turned off to prevent snooping.
Group of answer choices
a) RADIUS
b) telnet
c) ICMP
d) DNS
Question 12
The service within Kerberos that generates and issues session keys is known as _____.
Group of answer choices
a) TGS
b)KDS
c) VPN
d) AS

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

International Accounting

Authors: Timothy Doupnik, Hector Perera

3rd Edition

978-0078110955

Students also viewed these Finance questions