“Do I Know This Already?” Quiz

The “Do I Know This Already?” quiz helps you determine your level of knowledge of this chapter’s topics before you begin. Table 14-1 details the major topics discussed in this chapter and their corresponding quiz questions.

Image

Table 14-1 “Do I Know This Already?” Section-to-Question Mapping

1. Which firewall methodology requires the administrator to know and configure all the specific ports, IPs, and protocols required for the firewall?

a. AGL

b. Packet filtering

c. Stateful filtering

d. Proxy server

2. Which technology dynamically builds a table for the purpose of permitting the return traffic from an outside server, back to the client, in spite of a default security policy that says no traffic is allowed to initiate from the outside networks?

a. Proxy

b. NAT

c. Packet filtering

d. Stateful filtering

3. What does application layer inspection provide?

a. Packet filtering at Layer 5 and higher

b. Enables a firewall to listen in on a client/server communication, looking for information regarding communication channels

c. Proxy server functionality

d. Application layer gateway functionality

4. Which one of the following is true about a transparent firewall?

a. Implemented at Layer 1

b. Implemented at Layer 2

c. Implemented at Layer 3

d. Implemented at Layer 4 and higher

5. What is the specific term for performing Network Address Translation for multiple inside devices but optimizing the number of global addresses required?

a. NAT-T

b. NAT

c. PAT

d. PAT-T

6. What term refers to the internal IP address of a client using NAT as seen from other devices on the same internal network as the client?

a. Inside local

b. Inside global

c. Outside local

d. Outside global

7. Which of the following describes a rule on the firewall which will never be matched because of where the firewall is in the network?

a. Orphaned rule

b. Redundant rule

c. Shadowed rule

d. Promiscuous rule

8. What is the long-term impact of providing a promiscuous rule as a short-term test in an attempt to get a network application working?

a. The promiscuous rule may be left in place, leaving a security hole.

b. The rule cannot be changed later to more accurately filter based on the business requirement.

c. It should be a shadowed rule.

d. Change control documentation may not be completed for this test.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset