chapter 6 - A best practice for firewall rule configuration states that all routine HTTP traffic from outside the network is allowed in False A content

chapter 6 - A best practice for firewall rule configuration...

This preview shows page 1 - 2 out of 3 pages.

A best practice for firewall rule configuration states that all routine HTTP traffic from outside the network is allowed in. False A content filter is essentially a set of scripts or programs that restricts user access to certain networking protocols and Internet locations. True A content filter is technically a firewall. False A packet’s content is independent from the nature of the packet. False A VPN allows a user to use the Internet as if it were a private network. True A VPN is "a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures."A(n) dual-homed host probably has the ability to translate between many different protocols at their respective data link layers, including Ethernet, Token Ring, and Fiber Distributed Data Interface. True A(n) perimeter is a segment of the DMZ where additional authentication and authorization controls are put into place to provide services that are not available to the general public. False Address grants prohibit packets with certain addresses or partial addresses from passing through the device. False All organizations with an Internet connection have some form of a router as the interface to the Internet at the DMZ between the organization's internal networks and the external service provider. False All organizations with an Internet connection have some form of a router as the interface to the Internet at the DMZ between the organization's internal and the external service provider. False
Image of page 1
Image of page 2

You've reached the end of your free preview.

Want to read all 3 pages?

  • Spring '13
  • Beugre
  • Networking, Information Security, Computer network, IP address, Virtual private network, Packet filtering, packet filtering firewalls

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture