Filters
Question type

Study Flashcards

It is important that e-mail traffic reach your e-mail server and only your e-mail server.

A) True
B) False

Correct Answer

verifed

verified

Port Address Translation assigns non-routing local addresses to computer systems in the local area network and uses ISP-assigned addresses to communicate with the Internet on a one-to-one basis. _________________________

A) True
B) False

Correct Answer

verifed

verified

The restrictions most commonly implemented in packet-filtering firewalls are based on __________.


A)  IP source and destination address 
B)  Direction (inbound or outbound)  
C)  TCP or UDP source and destination port requests 
D)  All of the above

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

__________ filtering requires that the firewall's filtering rules for allowing and denying packets are developed and installed with the firewall.


A)  Dynamic
B)  Static 
C)  Stateful
D)  Stateless

E) None of the above
F) All of the above

Correct Answer

verifed

verified

__________ and TACACS are systems that authenticate the credentials of users who are trying to access an organization's network via a dial-up connection.


A)  RADIUS
B)  RADIAL 
C)  TUNMAN
D)  IPSEC

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A(n) ____________________ filter is a software filter-technically not a firewall-that allows administrators to restrict access to content from within a network.

Correct Answer

verifed

verified

The ____________________ Access Controller Access Control System contains a centralized database, and it validates the user's credentials at the TACACS server.

Correct Answer

verifed

verified

Terminal

In order to keep the Web server inside the internal network, direct all HTTP requests to the internal filtering firewall and configure the internal filtering router/firewall to allow only that device to access the internal Web server. _________________________

A) True
B) False

Correct Answer

verifed

verified

Kerberos uses asymmetric key encryption to validate an individual user to various network resources. _________________________

A) True
B) False

Correct Answer

verifed

verified

False

Traceroute, formally known as an ICMP Echo request, is used by internal systems administrators to ensure that clients and servers can communicate. _________________________

A) True
B) False

Correct Answer

verifed

verified

One of the biggest challenges in the use of the trusted computer base (TCB) is the existence of explicit channels. _________________________

A) True
B) False

Correct Answer

verifed

verified

Content filters are often called ____________________ firewalls.

Correct Answer

verifed

verified

List and describe the interacting services of the Kerberos system.

Correct Answer

verifed

verified

Kerberos consists of three interacting s...

View Answer

​Task-based controls are associated with the assigned role a user performs in an organization, such as a position or temporary assignment like project manager.

A) True
B) False

Correct Answer

verifed

verified

The filtering component of a content filter is like a set of firewall rules for Web sites, and is common in residential content filters. _________________________

A) True
B) False

Correct Answer

verifed

verified

False

The architecture of a(n) ____________________ firewall provides a DMZ.

Correct Answer

verifed

verified

The ____________________ describes the number of legitimate users who are denied access because of a failure in the biometric device. This failure is known as a Type I error.

A) True
B) False

Correct Answer

verifed

verified

Internet connections via dial-up lines are regaining popularity due to recent technological developments.

A) True
B) False

Correct Answer

verifed

verified

The RADIUS system decentralizes the responsibility for authenticating each user by validating the user's credentials on the NAS server.

A) True
B) False

Correct Answer

verifed

verified

Some firewalls can filter packets by protocol name.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 106

Related Exams

Show Answer