At what layer of the OSI model do proxy servers generally operate? |
a. Application |
The Cisco PIX line of products is best described as which of the following? |
c. firewall appliance |
What are the two standard ports used by FTP along with their function? |
b. TCP 21 control, TCP 20 data |
What is a suggested maximum size of a rule base? |
b. 30 rules |
What is considered the ‘cleanup rule’ on a Cisco router? |
a. implicit deny all |
What service uses UDP port 53? |
a. DNS |
What should a company concerned about protecting its data warehouses and employee privacy might consider installing on the network perimeter to prevent direct connections between the internal network and the Internet? |
d. proxy server |
What type of attack are stateless packet filters particularly vulnerable to? |
c. IP spoofing attacks |
What type of ICMP packet can an attacker use to send traffic to a computer they control outside the protected network? |
c. Redirect |
Which element of a rule base conceals internal names and IP addresses from users outside the network? |
c. NAT |
Which of the following is a general practice for a rule base? |
a. permit access to public servers in the DMZ |
Which of the following is a method for supporting IPv6 on IPv4 networks until IPv6 is universally adopted? |
a. permit access to public servers in the DMZ |
Which of the following is a typical drawback of a free firewall program? |
c. cannot monitor traffic in real time |
Which of the following is an advantage of hardware firewalls? |
b. not dependent on a conventional OS |
Which of the following is described as the combination of an IP address and a port number? |
a. socket |
Which of the following is NOT a criteria typically used by stateless packet filters to determine whether or not to block packets. |
c. data patterns |
Which of the following is NOT a protocol,port pair that should be filtered when an attempt is made to make a connection from outside the company network? |
b. TCP,80 |
Which of the following is NOT among the common guidelines that should be reflected in the rule base to implement an organization’s security policy? |
b. employees can use instant-messaging only with external network users |
Which of the following is NOT an ICMPv6 packet type that you should allow within your organization but never outside the organization? |
b. Packet Redirect |
Which two ports should packet-filtering rules address when establishing rules for Web access? |
b. 80, 443 |
In what type of attack are zombies usually put to use? |
c. DDoS |
What do you call a firewall that is connected to the Internet, the internal network, and the DMZ? |
d. three-pronged firewall |
What is a critical step you should take on the OS you choose for a bastion host? |
c. ensure all security patches are installed |
What is a step you can take to harden a bastion host? |
c. remove unnecessary services |
What is the term used for a computer placed on the network perimeter that is meant to attract attackers? |
c. honeypot |
What should you consider installing if you want to inspect packets as they leave the network? |
b. reverse firewall |
Where should network management systems generally be placed? |
a. out of band |
Which network device works at the Application layer by reconstructing packets and forwarding them to Web servers? |
b. proxy server |
Which of the following best describes a bastion host? |
c. a computer on the perimeter network that is highly protected |
Which of the following best describes a DMZ? |
b. a subnet of publicly accessible servers placed outside the internal network |
Which of the following is a disadvantage of using a proxy server? |
d. may require client configuration |
Which of the following is best described as software that prioritizes and schedules requests and then distributes them to servers based on each server’s current load and processing power. |
a. load-balancing software |
Which of the following is true about a dual-homed host? |
c. serves as a single point of entry to the network |
Which of the following is true about a screening router? |
c. it should be combined with a firewall for better security |
Which of the following is true about private IP addresses? |
c. they are not routable on the Internet |
Which type of firewall configuration protects public servers by isolating them from the internal network? |
b. screened subnet DMZ |
Which type of NAT is typically used on devices in the DMZ? |
a. one-to-one NAT |
Which type of security device can speed up Web page retrieval and shield hosts on the internal network? |
d. proxy server |
Which type of translation should you use if you need 50 computers in the corporate network to be able to access the Internet using a single public IP address? |
b. port address translation |
Why is a bastion host the system most likely to be attacked? |
a. it is available to external users |
OS Hardening SEC340 – Chapter 9 & 10
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price