Filters
Question type

Study Flashcards

_________ control controls how particular services are used.


A) Service
B) Behavior
C) User
D) Direction

Correct Answer

verifed

verified

A traditional packet filter makes filtering decisions on an individual packet basis and does not take into consideration any higher layer context.

Correct Answer

verifed

verified

_________ control determines the types of Internet services that can be accessed,inbound or outbound.


A) Behavior
B) Direction
C) Service
D) User

Correct Answer

verifed

verified

A _________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.

Correct Answer

verifed

verified

__________ are attacks that attempt to give ordinary users root access.


A) Privilege-escalation exploits
B) Directory transversals
C) File system access
D) Modification of system resources

Correct Answer

verifed

verified

Snort Inline enables Snort to function as an intrusion prevention capability.

Correct Answer

verifed

verified

A firewall can serve as the platform for IPSec.

Correct Answer

verifed

verified

One disadvantage of a packet filtering firewall is its simplicity.

Correct Answer

verifed

verified

_________ matching scans incoming packets for specific byte sequences (the signature)stored in a database of known attacks.

Correct Answer

verifed

verified

The _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter to protect the premises network from Internet-based attacks.

Correct Answer

verifed

verified

A ___________ makes use of both signature and anomaly detection techniques to identify attacks.

Correct Answer

verifed

verified

host-based...

View Answer

A single device that integrates a variety of approaches to dealing with network-based attacks is referred to as a __________ system.

Correct Answer

verifed

verified

UTM (unifi...

View Answer

The primary role of the personal firewall is to deny unauthorized remote access to the computer.

Correct Answer

verifed

verified

__________ anomaly watches for unusual traffic activities,such as a flood of UDP packets or a new service appearing on the network.

Correct Answer

verifed

verified

Typically the systems in the _________ require or foster external connectivity such as a corporate Web site,an e-mail server,or a DNS server.


A) DMZ
B) IP protocol field
C) boundary firewall
D) VPN

Correct Answer

verifed

verified

Unlike a firewall,an IPS does not block traffic.

Correct Answer

verifed

verified

Distributed firewalls protect against internal attacks and provide protection tailored to specific machines and applications.

Correct Answer

verifed

verified

The _________ attack is designed to circumvent filtering rules that depend on TCP header information.


A) tiny fragment
B) address spoofing
C) source routing
D) bastion host

Correct Answer

verifed

verified

A packet filtering firewall is typically configured to filter packets going in both directions.

Correct Answer

verifed

verified

A logical means of implementing an IPSec is in a firewall.

Correct Answer

verifed

verified

Showing 21 - 40 of 45

Related Exams

Show Answer