Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Q3

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
Firewalls fall into ________ major processing-mode categories.   show
🗑
________ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.   show
🗑
show d. All of the above  
🗑
____ filtering requires that the filtering rules governing how the firewall decides which packets are allowed and which are denied be developed and installed with the firewall.   show
🗑
show DYNAMIC  
🗑
____ inspection firewalls keep track of each network connection between internal and external systems.   show
🗑
show APPLICATION-LEVEL FIREWALL.  
🗑
The proxy server is often placed in an unsecured area of the network or is placed in the ____ zone.   show
🗑
The ____ is an intermediate area between a trusted network and an untrusted network   show
🗑
show MAC LAYER  
🗑
show WAPs  
🗑
show SACRIFICIAL  
🗑
show SCREENED subnet firewall.  
🗑
show SOCKS  
🗑
Telnet protocol packets usually go to TCP port   show
🗑
show 7  
🗑
In most common implementation models, the content filter has two components:   show
🗑
____ and TACACS are systems that authenticate the credentials of users who are trying to access an organization’s network via a dial-up connection.   show
🗑
show All of the above  
🗑
____ generates and issues session keys in Kerberos.   show
🗑
Kerberos ____ provides tickets to clients who request services.   show
🗑
show PAC  
🗑
show VPN  
🗑
show TRANSPORT  
🗑
show POINT TO POINT TUNNELING PROTOCOL  
🗑
A(n) ______________ is an information security program that prevents specific types of information from moving between the outside world and the inside world.   show
🗑
show FILTERING  
🗑
Simple firewall models enfors address ______________ , which are rules designed to prohibit packets with certain addresses or partial addresses from passing through the device.   show
🗑
show DYNAMIC  
🗑
The application firewall is also known as a(n) ______________ server.   show
🗑
show TRANSPORT  
🗑
show HYBRID  
🗑
show KERNEL  
🗑
Since the bastion host stands as the sole defender on the network perimeter, it is commonly referred to as the ______________ host.   show
🗑
show SCREENED SUBNET  
🗑
show SOCKS  
🗑
The firewall device is never accessible directly from the ______________ network.   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: majbala