Course Hero Logo

Which of the following firewalls are used to track

This preview shows page 79 - 81 out of 233 pages.

Which of the following firewalls are used to track the state of active connections anddetermine the network packets allowed to enter through the firewall?Each correct answerrepresents a complete solution. Choose all that apply.A.Circuit-level gatewayB.StatefulC.Proxy serverD.Dynamic packet-filteringAnswer: B,DExplanation:A dynamic packet-filtering firewall is a fourth generation firewall technology. It is also knownas a stateful firewall. It tracks the state of active connections and determines which networkQuestion No : 87 CORRECT TEXT - (Topic 1)Question No : 88- (Topic 1)ECCouncil 312-38 : Practice Test79
packets are allowed to enter through the firewall. It records session information, such as IPaddresses and port numbers to implement a more secure network. The dynamic packet-filtering firewall operates at Layer3, Layer4, and Layer5.Answer option A is incorrect. A circuit-level gateway is a type of firewall that works at thesession layer of the OSI model between the application layer and the transport layer of theTCP/IP stack. They monitor TCP handshaking between packets to determine whether arequested session is legitimate. Information passed to a remote computer through a circuitlevel gateway appears to have originated from the gateway. This is useful for hidinginformation about protected networks. Circuit-level gateways are relatively inexpensive andhave the advantage of hiding information about the private network they protect.Answer option C is incorrect. A proxy server firewall intercepts all messages entering andleaving the network. The proxy server effectively hides the true network addresses.Which of the following techniques is used for drawing symbols in public places foradvertising an open Wi-Fi wireless network?A.SpammingB.War drivingC.War dialingD.WarchalkingAnswer: DExplanation:Warchalking is the drawing of symbols in public places to advertise an open Wi-Fi wirelessnetwork. Having found a Wi-Fi node, the warchalker draws a special symbol on a nearbyobject, such as a wall, the pavement, or a lamp post. The name warchalking is derivedfrom the cracker terms war dialing and war driving.Answer option B is incorrect. War driving, also called access point mapping, is the act oflocating and possibly exploiting connections to wireless local area networks while drivingaround a city or elsewhere. To do war driving, one needs a vehicle, a computer (which canbe a laptop), a wireless Ethernet card set to work in promiscuous mode, and some kind ofan antenna which can be mounted on top of or positioned inside the car. Because awireless LAN may have a range that extends beyond an office building, an outside usermay be able to intrude into the network, obtain a free Internet connection, and possibly gainQuestion No : 89- (Topic 1)ECCouncil 312-38 : Practice Test80

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 233 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor
Tags

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture