Filters
Question type

In order to keep the Web server inside the internal network, direct all HTTP requests to the internal filtering firewall and configure the internal filtering router/firewall to allow only that device to access the internal Web server. _________________________

A) True
B) False

Correct Answer

verifed

verified

When Web services are offered outside the firewall, HTTP traffic should be blocked from internal networks through the use of some form of proxy access or DMZ architecture.

A) True
B) False

Correct Answer

verifed

verified

The primary disadvantage of stateful packet inspection firewalls is the additional processing required to manage and verify packets against the state table. _________________________

A) True
B) False

Correct Answer

verifed

verified

One of the biggest challenges in the use of the trusted computer base (TCB) is the existence of explicit channels. _________________________

A) True
B) False

Correct Answer

verifed

verified

Authentication is the process of validating and verifying an unauthenticated entity's purported identity.

A) True
B) False

Correct Answer

verifed

verified

The application firewall is also known as a(n) ____________________ server.

Correct Answer

verifed

verified

​Lattice-based access control is a form of access control in which users are assigned a matrix of authorizations for particular areas of access.

A) True
B) False

Correct Answer

verifed

verified

Most current operating systems require specialized software to connect to VPN servers, as support for VPN services is no longer built into the clients.

A) True
B) False

Correct Answer

verifed

verified

The presence of external requests for Telnet services can indicate a potential attack. _________________________

A) True
B) False

Correct Answer

verifed

verified

Kerberos ticket granting service (TGS), which provides tickets to clients who request services. In Kerberos a ticket is an identification card for a particular client that verifies to the server that the client is requesting services and that the client is a valid member of the Kerberos system and therefore authorized to receive services. The ticket consists of the client's name and network address, a ticket validation starting and ending time, and the session key, all encrypted in the private key of the server from which the client is requesting services.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

The Kerberos Ticket Granting Service (TG...

View Answer

A VPN, used properly, allows use of the Internet as if it were a private network.

A) True
B) False

Correct Answer

verifed

verified

The RADIUS system decentralizes the responsibility for authenticating each user by validating the user's credentials on the NAS server.

A) True
B) False

Correct Answer

verifed

verified

The architecture of a(n) ____________________ firewall provides a DMZ.

Correct Answer

verifed

verified

Authentication is a mechanism whereby unverified entities who seek access to a resource provide a label by which they are known to the system. _________________________

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not a major processing mode category for firewalls?


A) Packet-filtering firewalls
B) Application gateways
C) Circuit gateways ​
D) Router passthru

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

In static filtering, configuration rules must be manually created, sequenced, and modified within the firewall. _________________________

A) True
B) False

Correct Answer

verifed

verified

A routing table tracks the state and context of each packet in the conversation by recording which station sent what packet and when. _________________________

A) True
B) False

Correct Answer

verifed

verified

Firewalls operate by examining a data packet and performing a comparison with some predetermined logical rules. _________________________

A) True
B) False

Correct Answer

verifed

verified

Key Distribution Center (KDC), which generates and issues session keys.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

The Key Distribution Center (KDC) is a c...

View Answer

The DMZ can be a dedicated port on the firewall device linking a single bastion host.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 117

Related Exams

Show Answer