_________________________
(A) True
(B) False
Answer :
(B)

MULTICHOICE
55.
__________ access control is a form of __________ access control in which users are assigned a
matrix of authorizations for particular areas of access.
(A) lattice-based, discretionary
(B) arbor-based, nondiscretionary
(C) arbor-based, discretionary
(D) lattice-based, nondiscretionary
Answer :
(D)
56.
Which of the following is not a major processing mode category for firewalls?
(A) Packet-filtering firewalls
(B) Application gateways
(C) Circuit gateways
(D) Router passthru
Answer :
(D)
57.
__________ firewalls examine every incoming packet header and can selectively filter packets
based on header information such as destination address, source address, packet type, and other key
information.
(A) Packet-filtering
(B) Application gateway
(C) Circuit gateway
(D) MAC layer
Answer :
(A)
58.
The restrictions most commonly implemented in packet-filtering firewalls are based on
__________.
(A) IP source and destination address
(B) Direction (inbound or outbound)
(C) TCP or UDP source and destination port requests
(D) All of the above

Answer :
(D)
59.
__________ filtering requires that the firewall's filtering rules for allowing and denying packets
are developed and installed with the firewall.
(A) Dynamic
(B) Static
(C) Stateful
(D) Stateless
Answer :
(B)
60.
A __________ filtering firewall can react to an emergent event and update or create rules to deal
with the event.
(A) dynamic
(B) static
(C) stateful
(D) stateless
Answer :
(A)
61.
__________ inspection firewalls keep track of each network connection between internal and
external systems.
(A) Static
(B) Dynamic
(C) Stateful
(D) Stateless
Answer :
(C)
62.
The application layer proxy firewall is also known as a(n) __________.
(A) application firewall
(B) client firewall
(C) proxy firewall
(D) All of the above

Answer :
(A)
63.
The proxy server is often placed in an unsecured area of the network or is placed in the
__________ zone.
(A) fully trusted
(B) hot
(C) demilitarized
(D) cold
Answer :
(C)
64.
The __________ is an intermediate area between a trusted network and an untrusted network.
(A) perimeter
(B) DMZ
(C) domain
(D) firewall
Answer :
(B)
65.
__________ firewalls are designed to operate at the media access control sublayer of the data link
layer of the OSI network model.
(A) MAC layer
(B) Circuit gateway
(C) Application gateway
(D) Packet-filtering
Answer :
(A)
66.
Because the bastion host stands as a sole defender on the network perimeter, it is commonly
referred to as the __________ host.
(A) trusted
(B) domain
(C) DMZ
(D) sacrificial

Answer :
(D)
67.
The dominant architecture used to secure network access today is the __________ firewall.
(A) static
(B) bastion
(C) unlimited
(D) screened subnet
Answer :
(D)
68.
Configuring firewall policies is viewed as much as a(n) __________ as it is a(n) __________.
(A) art, science
(B) philosophy, skill
(C) skill, science
(D) pain, necessity
Answer :
(A)
69.
Telnet protocol packets usually go to TCP port __________, whereas SMTP packets go to port
__________.
(A) 23, 52
(B) 80, 52
(C) 80, 25
(D) 23, 25
Answer :
(D)
70.
Known as the ping service, ICMP is a(n) __________ and should be ___________.


You've reached the end of your free preview.
Want to read all 20 pages?
- Summer '17
- IP address, Denial-of-service attack, Computer network security , Technology Chapter