Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Net def mod 5,6,

Net def mod 5,6,7

QuestionAnswer
Which three layers of the OSI model include information that is commonly inspected by a stateful firewall? (Choose three.) Layer 3,4,5
How does a firewall handle traffic that is originating from the DMZ network and traveling to a private network? Traffic is usually blocked when it is originating from the DMZ network and traveling to a private network.
Which type of firewall is supported by most routers and is the easiest to implement? packet filtering firewall.
Which type of traffic is usually blocked when implementing a demilitarized zone? traffic originating from the DMZ network and traveling to the private network
What are two benefits of implementing a firewall in a network? (Choose two.) A firewall will sanitize protocol flow. A firewall will reduce security management complexity.
Which type of firewall is commonly part of a router firewall and allows or blocks traffic based on Layer 3 or 4 information? packet filtering firewall
Which two protocols are stateless and do not generate connection information needed to build a state table? (Choose two.) ICMP UDP
What is one benefit of using a next-generation firewall rather than a stateful firewall? integrated use of an intrusion prevention system (IPS).
What are two characteristics of an application gateway firewall? (Choose two.) Analyzes traffic at Layers 3, 4, 5 and 7 of the OSI model. Performs most filtering and firewall control in software.
Which type of firewall generally has a low impact on network performance? stateless firewall
When implementing a ZPF, which statement describes a zone? A zone is a group of one or more interfaces that have similar functions or features.
Which statement is a characteristic of a packet filtering firewall? They are susceptible to IP spoofing.
Which statement describes a zone when implementing ZPF on a Cisco router? A zone establishes a security border of a network.
When a Cisco IOS zone-based policy firewall is being configured, which two actions can be applied to a traffic class? (Choose two.) drop inspect
Designing a ZPF requires several steps. Which step involves defining boundaries where traffic is subjected to policy restrictions as it crosses to another region of the network? determine the zones
Which statement describes a feature of a zone-based policy firewall? It does not depend on ACLs.
When configuring a class map for a zone-based policy firewall, how is the match criteria applied when using the match-all parameter? Traffic must match all of the match criteria specified in the statement.
Which three statements describe zone-based policy firewall rules that govern interface behavior and the traffic moving between zone member interfaces? (Choose three.) Pass, inspect, and drop options can only be applied between two zones. To permit traffic to and from a zone member interface, If traffic is to flow between all interfaces in a router,
In ZPF design, what is described as the self zone? the router itself, including all interfaces with assigned IP addresses
Which statement describes a factor to be considered when configuring a zone-based policy firewall? A zone must be configured with the zone security global command before it can be used in the zone-member security command.
In what step of zone-based policy firewall configuration is traffic identified for policy application? configuring class maps
How does ZPF handle traffic between an interface that is a zone member and another interface that does not belong to any zone? drop
Which statement describes one of the rules that govern interface behavior in the context of implementing a zone-based policy firewall configuration? By default, traffic is allowed to flow among interfaces that are members of the same zone.
Which statement accurately describes Cisco IOS zone-based policy firewall operation? The pass action works in only one direction.
Which type of firewall filters information at Layers 3, 4, 5, and 7 of the OSI reference model? Application Gateway
Which type of firewall is a combination of various firewall types? Hybrid
Which type of firewall is part of a router firewall, permitting or denying traffic based on Layer 3 and Layer 4 information? Packet filtering
Which type of firewall is a PC or server with firewall software running on it? Host-based
Which type of firewall filters IP traffic between a pair of bridged interfaces? Transparent
Which network security design typically uses one inside interface, one outside interface, and one DMZ interface? demilitarized
Which security design uses different types of firewalls and security measures that are combined at different areas of the network to add depth to the security of an organization ? layered defense
Which three statements describe trusted and untrusted areas of the network? (Choose three.) - The public internet is generally considered untrusted. - Internal networks, except the DMZ, are considered trusted. - In a ZPF network, traffic that moves within zones is generally considered trusted.
Which network design groups interfaces into zones with similar functions or features? ZPF
What are two best practices when implementing firewall security policies? - Disable unnecessary network services. - Strictly control physical access to firewall devices.
Created by: jajacoal
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards