Question
Question 1 To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictly necessary. True False True only
Question 1
To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictly necessary.
True
False
True only if the firewall is not from a name brand manufacturer.
True only if there is no existing hardware inventory in place.
Question 2
A network administrator is evaluating different firewalls. Which of the following firewalls provides deep packet inspection, looks at the packet payload for malicious content, and hides servers from traffic that might be malicious?
Application layer gateway
Personal
Corporate
Stateful packet inspection
Packet filtering
Question 3
A firewall examines each packet entering or leaving the network, and accepts or drops it based on:
Attack patterns
Pre-defined firewall rules
Definitions
Signatures
Question 4
A newly hired security administrator is reviewing firewall rules for mistakes. Which firewall rules require matching of the interface and direction?
Erroneous rules
Anti-spoofing rules
Shadowed rules
Orphaned rules
Default deny
Question 5
A newly hired security administrator is reviewing firewall rules for mistakes. Which of the following are firewall rules might present a problem? (Choose all that apply.)
Anti-spoofing rules
Default deny
Orphaned rules
Shadowed rules
Erroneous rules
Question 6
What can be used to offer an extra layer of protection on the network for those hosts running behind the firewall?
Load balancer
Load concentrator
Reverse proxy
DMZ
Caching only proxy
Question 7
An administrator for Corp.com wants to setup secure remote access to their network so that only authorized external networks will be allowed to access certain internal resources. Which of the following would MOST likely need to be implemented and configured on the Corp.com's perimeter network? (Choose all that apply.)
Load balancer
Firewall
Proxy server
Network Access Control (NAC)
VPN concentrator
Question 8
By default the server side of a RDP connection will listen on which port?
TCP and UDP port 3386.
TCP and UDP port 3389.
TCP port 3387.
TCP port 3389.
UDP port 3389.
TCP and UDP port 3388.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started