Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

N+

Ch. 15 chapter review

QuestionQuestionAnswerAnswerAnswer
3. What is the main difference between a network-based firewall and a host-based firewall? A.Network-based protects the Internet from attacks. B.Network-based protects a network, not just a single host C.Network based protects the network wires 3. Network based protects a CD from data loss. 3. B. A network-based firewall is what companies use to protect their private network from public networks. the defining characteristic of this type of firewall is that it's designed to protect an entire network of computers as opposed to just one 3. system. this is usually a combination of hardware and software. a host-based firewall is implemented on one machine and is designed to protect that machine only. most often, this is implemented as software; no additional hardware is required in your 3. personal computer to run a host-based firewall.
4. what is one advantage that a stateless firewall has over its stageful counterparts? A. It uses less power b. it utilizes less memory c. it's better at preventing network attacks d. it works better on external networks 4 4. B. The one big advantage that a stateless firewall has over its stageful counterparts is that it uses less memory. today, stateless firewalls are best if used on an internal network where security threats are lower and there are few restrictions. 4 4
5. Which of the the following items can't be identified by the NESSUS program? A.Default password use B. Incorrect IP addresses C. Unsecured data D. Missing security patches 5 5. B. NESSUS can't identify an incorrect IP address. 5 5
6. What is the benefit of using a firewall? A. Protects external users B. Protects external hardware C. Protects LAN resources D. Protects hardware from failure. 6 6. C. One of the benefits of using a firewall is that it helps protect LAN resources from unwanted attacks 6 6
7. IDS systems can identify attackers by their ___________. A. Port number b. signature c. timing d. IV 7 7. B. An intrusion detection system (IDS) monitors network traffic, looking for signs of an intrusion. intrusions are detected by an attack signature. 7 7
8. Which device can limit traffic on a network and allow access onto specific TCP/IP port numbers when security is a concern? A. Hub b.firewall c. DNS d. modem 8 8. B. firewalls, which use access lists, can permit or deny connections and types of traffic in or out of the network. 8 8
9.which is not a type of access control list (ACL)? A. standard b. extended c. referred d. outbound 9 9. C. Standard, extended, and outbound are all types of ACL. Referred is not. 9 9
10. what is it called when the firewall ignores an attack? a. logging b. shunning c. notification d. false negative 10 10. B. You can sometimes just ignore the attack because it's possible it won't affect your network. this is called shunning. 10 10
11. what is the function of a DMZ? a. to separate a security zone for an IPS and IDS server b. to create a security zone for VPN terminations c. to create a security zone that allows public traffic but is isolated from the private inside network d. 11. d. to create a security zone that allows private traffic but is isolated from the public network. 11. C. A DMZ can be set up many different ways, but the best explanation is the DMZ is used to separate and secure your inside network from the Internet, while still allowing hosts on the Internet to access your servers. 11 11
12. which of the following are types of services that firewalls can provide? a. content filtering b. segregate network segments c. signature identification d. scanning services e. all of the above 12 12. E. Most firewalls provide content filtering, signature identification, and the ability to segregate network segments into separate security zones. most firewalls are also capable of performing scanning services, which means that they scan different 12. types of incoming traffic in a effort to detect problems. 12
13. which type of security device monitors network traffic, looking for signs of an intrusion? a. intrusion detection system b. demilitarized zone (DMZ) c. firewall d. VPN concentrator 13 13. A. An intrusion detection system (IDS) monitors network traffic, looking for signs of an intrusion. intrusions are detected my matching activity versus known signatures within the IDS's database. if an intrusion is detected, a passive 13. response such as logging or notifying a network administrator is exectuted. an intrusion prevention system (IPS) is like an IDS, but with two key differences.first, it learns what is "normal" on the network and can react to abnormalities even if they 13. aren't part of the signature database. second, it can issuer an active response such as shutting down a port, resetting connections, or attempting to lull the attacker into a trap.
14. which of the following is a vulnerability scanner? a. network monitor b. NESSUS c. traceroute d. tripwire 14 14. B. NESSUS is a propriety vulnerability scanning program that requires a license for commercial use yet is the single most popular scanning program in use. 14 14
15. which of the following is NOT a function of NMAP? a. perform port scanning b. identify operating systems c. collect passwords d. identify versions of network services in operation on the network 15 15. C. NESSUS does not collect passwords. 15 15
16. changing network configurations, terminating sessions, and deceiving the attacker are actions that can be taken from what type of security device? a. access control list (ACL) b. content filtering c. security zones d. intrusion prevention system ( 16 16. D. Changing network configurations, terminating sessions, and deceiving the attacker are all actions that can be taken by an IPS device. 16 16
17. __________ act on behalf of the whole network to completely separate packets from internal hosts and external hosts a. honeypots b. IDSs C. IPSs D. proxies 17 17. D. Proxies act on behalf of the whole network to completely separate packets from internal hosts and external hosts. 17 17
18. which of the following can't be identified by NESSUS? A. unsecured access to sensitive data on a system b. IP address conflicts c. misconfigurations like open mail relay. d. password issues 18 18. B. NESSUS operates by performing a port scan and then follows up with more specific tests, but it can't identify IP address conflicts. 18 18
19. A _________ firewall keeps track of the established connections passing through it. a. hardware b. software c. stateful d. network 19 19. C. A stateful firewall keeps track of the established connections passing through it.when another packet is received that's part of an existing connection (part of a current state), the packet is passed without checking the ACLs. 19 19
20. A(n) ________ learns what is "normal" on the network and can react to abnormalities even if they're not part of the signature database. A. IDS B. Firewall C. IPS D. VPN concentrator 20 20. C. An intrusion prevention system (IPS) is like an IDS, but with two key differences. first, it learns what is "normal" on the network and can react to 20. abnormalities even if they're not part of the signature database. second, it can issue an active response such as shutting down a port, resetting connections, or attempting to lull an attacker into a trap. 20
1. In general, firewalls work by __________. A. Rejecting all packets regardless of security restrictions. B.Forwarding all packets regardless of security restrictions 1. C. Allowing only packets that pass security restrictions to be forwarded. D. None of the above 1. C.Firewalls work by allowing only packets that pass security restrictions to be forwarded through the firewall. a firewall can also permit, deny, encrypt, decrypt, and proxy all computer traffic that flows through it; this can be between a public 1. and private network or between different security domains (or zones) on a private network. you as the administrator set up the rules by which a firewall decides to forward or reject packets of data. 1
2. In which layer of the OSI model do software firewalls operate? choose all that apply A.Application B.Presentation C.Physical D.Network 2 2. A,D. Firewalls work at the Application layer or the Network layer. 3 2
Created by: baumsquad
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards