Your company has a connection to the internet that allows users to access the internet. You also have a web server and an email server that you want to make available to the internet users. You want to created a DMZ for these two servers. Which type of device should you use to create the DMZ? |
Network-based firewall |
Which of the following is a firewall function? |
Packet filtering |
You manage a small network at work. Users use workstations connected to your network. No portable computers are allowed. As part of your security plan, you would like to implement scanning of e-mails for all users. You want to scan the e-mails and prevent any e-mails with malicious attachments from being received by users. Your solution should minimize administration, allowing you to centrally manage the scan settings. Which solution should you use? |
Network based firewall |
Which of the following are characteristics of a circuit-level gateway? (Select two.) |
Filters based on sessions Stateful |
Which of the following are characteristics of a packet filtering firewall? (Select two.) |
Filters IP address and port Stateless |
You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use? |
Circuit-level |
You provide Internet access for a local school. You want to control Internet access based on user, and prevent access to specific URLs. Which type of firewall should you install? |
Application-level |
Which of the following is the best device to deploy to protect your private network from a public untrusted network? |
Firewall |
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-bases attacks. What solution should you use? |
Host based firewall |
Which of the following are true of a circuit proxy filter firewall?(Select two) |
Operates at the Session Layer Verifies sequencing of session packets |
You would like to control Internet access based on users, time of day, and Web sites visited. How can you do this? |
Install a proxy server. Allow Internet access only though the proxy server. |
Which of the following does a router acting as a firewall use to control which packets are forwarded or dropped? |
ACL |
Which of the following describes how access lists can be used to improve network security? |
An access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers. |
When designing a firewall, what is the recommended approach for opening and closing ports? |
Close all ports; open only ports required by applications inside the DMZ |
Which of the following firewall types can be a proxy between servers and clients?(Select two) |
Application layer firewall AND Circuit proxy filtering firewall |