Q3
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Firewalls fall into ________ major processing-mode categories. | show 🗑
|
||||
________ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information. | show 🗑
|
||||
show | d. All of the above
🗑
|
||||
____ filtering requires that the filtering rules governing how the firewall decides which packets are allowed and which are denied be developed and installed with the firewall. | show 🗑
|
||||
show | DYNAMIC
🗑
|
||||
____ inspection firewalls keep track of each network connection between internal and external systems. | show 🗑
|
||||
show | APPLICATION-LEVEL FIREWALL.
🗑
|
||||
The proxy server is often placed in an unsecured area of the network or is placed in the ____ zone. | show 🗑
|
||||
The ____ is an intermediate area between a trusted network and an untrusted network | show 🗑
|
||||
show | MAC LAYER
🗑
|
||||
show | WAPs
🗑
|
||||
show | SACRIFICIAL
🗑
|
||||
show | SCREENED subnet firewall.
🗑
|
||||
show | SOCKS
🗑
|
||||
Telnet protocol packets usually go to TCP port | show 🗑
|
||||
show | 7
🗑
|
||||
In most common implementation models, the content filter has two components: | show 🗑
|
||||
____ and TACACS are systems that authenticate the credentials of users who are trying to access an organization’s network via a dial-up connection. | show 🗑
|
||||
show | All of the above
🗑
|
||||
____ generates and issues session keys in Kerberos. | show 🗑
|
||||
Kerberos ____ provides tickets to clients who request services. | show 🗑
|
||||
show | PAC
🗑
|
||||
show | VPN
🗑
|
||||
show | TRANSPORT
🗑
|
||||
show | POINT TO POINT TUNNELING PROTOCOL
🗑
|
||||
A(n) ______________ is an information security program that prevents specific types of information from moving between the outside world and the inside world. | show 🗑
|
||||
show | FILTERING
🗑
|
||||
Simple firewall models enfors address ______________ , which are rules designed to prohibit packets with certain addresses or partial addresses from passing through the device. | show 🗑
|
||||
show | DYNAMIC
🗑
|
||||
The application firewall is also known as a(n) ______________ server. | show 🗑
|
||||
show | TRANSPORT
🗑
|
||||
show | HYBRID
🗑
|
||||
show | KERNEL
🗑
|
||||
Since the bastion host stands as the sole defender on the network perimeter, it is commonly referred to as the ______________ host. | show 🗑
|
||||
show | SCREENED SUBNET
🗑
|
||||
show | SOCKS
🗑
|
||||
The firewall device is never accessible directly from the ______________ network. | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
majbala