Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictly necessary. True False True only

Question 1

To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictly necessary.

True

False

True only if the firewall is not from a name brand manufacturer.

True only if there is no existing hardware inventory in place.

Question 2

A network administrator is evaluating different firewalls. Which of the following firewalls provides deep packet inspection, looks at the packet payload for malicious content, and hides servers from traffic that might be malicious?

Application layer gateway

Personal

Corporate

Stateful packet inspection

Packet filtering

Question 3

A firewall examines each packet entering or leaving the network, and accepts or drops it based on:

Attack patterns

Pre-defined firewall rules

Definitions

Signatures

Question 4

A newly hired security administrator is reviewing firewall rules for mistakes. Which firewall rules require matching of the interface and direction?

Erroneous rules

Anti-spoofing rules

Shadowed rules

Orphaned rules

Default deny

Question 5

A newly hired security administrator is reviewing firewall rules for mistakes. Which of the following are firewall rules might present a problem? (Choose all that apply.)

Anti-spoofing rules

Default deny

Orphaned rules

Shadowed rules

Erroneous rules

Question 6

What can be used to offer an extra layer of protection on the network for those hosts running behind the firewall?

Load balancer

Load concentrator

Reverse proxy

DMZ

Caching only proxy

Question 7

An administrator for Corp.com wants to setup secure remote access to their network so that only authorized external networks will be allowed to access certain internal resources. Which of the following would MOST likely need to be implemented and configured on the Corp.com's perimeter network? (Choose all that apply.)

Load balancer

Firewall

Proxy server

Network Access Control (NAC)

VPN concentrator

Question 8

By default the server side of a RDP connection will listen on which port?

TCP and UDP port 3386.

TCP and UDP port 3389.

TCP port 3387.

TCP port 3389.

UDP port 3389.

TCP and UDP port 3388.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

At what level(s) was this OD intervention scoped?

Answered: 1 week ago