Filters
Question type

DMZs never have more than two kinds of hosts.

Correct Answer

verifed

verified

A connection is a persistent conversation between different programs on different computers.

Correct Answer

verifed

verified

________ firewalls handle traditional firewall processing, antivirus filtering, and spam filtering.


A) Unified threat management
B) Ingress
C) Egress
D) Static packet filter

Correct Answer

verifed

verified

________ means that a border firewall is connected to multiple subnets.


A) DMZ
B) Multihomed
C) Logging
D) Ingress filtering

Correct Answer

verifed

verified

Hardware filtering is much faster than software filtering,

Correct Answer

verifed

verified

Intrusion prevention system filtering is considered ________.


A) a new type of filtering
B) old technology
C) one of the most effective and long-used type of filtering
D) too expensive and too time-consuming for most businesses

Correct Answer

verifed

verified

Multihoming tends to make it easier to develop rules to control access to public-facing hosts and internal hosts.

Correct Answer

verifed

verified

________ identify suspicious packets that may or may not be parts of attacks.


A) IDSs
B) Firewalls
C) Static packet inspection
D) Deep packet inspection

Correct Answer

verifed

verified

When a firewall examines a packet passing through it, it will drop the packet if it is ________.


A) a provable attack packet
B) a suspicious packet
C) not a provable attack packet
D) a stateful packet

Correct Answer

verifed

verified

Normally, firewalls are configured to only log packets that they drop.

Correct Answer

verifed

verified

Firewalls typically have antivirus filtering.

Correct Answer

verifed

verified

________ is typically considered the most time-consuming part of firewall administration.


A) Installing software
B) Configuring hardware
C) Reading firewall logs
D) Creating policies

Correct Answer

verifed

verified

Port numbers ranging from 1024 to 49151 are ________.


A) source ports
B) registered ports
C) ephemeral ports
D) TCP ports

Correct Answer

verifed

verified

Antivirus filtering uses signatures to detect viruses, worms, and Trojan horses.

Correct Answer

verifed

verified

Which of the following is NOT a type of filtering?


A) Stateful packet inspection
B) Static packet
C) Antivirus
D) Authentication

Correct Answer

verifed

verified

________ consist of a series of rules that are exceptions to the default behavior.


A) IPS
B) SPI
C) IDS
D) ACLs

Correct Answer

verifed

verified

SPI application inspection provides the same automatic protections offered by application proxy firewalls.

Correct Answer

verifed

verified

Both border firewalls and internal firewalls are complex to set up.

Correct Answer

verifed

verified

________ firewalls examine application messages in depth.


A) Application proxy
B) Unified threat management
C) Egress
D) Static packet filter

Correct Answer

verifed

verified

A ________ is made by a firewall.


A) NAT/PAT
B) unified threat
C) pass/deny decision
D) log file

Correct Answer

verifed

verified

Showing 21 - 40 of 68

Related Exams

Show Answer