OS Hardening SEC340 – Chapter 9 & 10

Your page rank:

Total word count: 1646
Pages: 6

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

At what layer of the OSI model do proxy servers generally operate?
Select one:
a. Application
b. Transport
c. Network
d. Session

a. Application

The Cisco PIX line of products is best described as which of the following?
Select one:
a. PC with firewall installed
b. software firewall
c. firewall appliance
d. VPN gateway

c. firewall appliance

What are the two standard ports used by FTP along with their function?
Select one:
a. UDP 23 control, TCP 20 data
b. TCP 21 control, TCP 20 data
c. UDP 20 data, TCP 21 control
d. TCP 23 data, TCP 21 control

b. TCP 21 control, TCP 20 data

What is a suggested maximum size of a rule base?
Select one:
a. 10 rules
b. 30 rules
c. 300 rules
d. 100 rules

b. 30 rules

What is considered the ‘cleanup rule’ on a Cisco router?
Select one:
a. implicit deny all
b. implicit allow
c. explicit prompt
d. explicit allow all

a. implicit deny all

What service uses UDP port 53?
Select one:
a. DNS
b. SMTP
c. ICMP
d. TFTP

a. DNS

What should a company concerned about protecting its data warehouses and employee privacy might consider installing on the network perimeter to prevent direct connections between the internal network and the Internet?
Select one:
a. VPN server
b. router
c. ICMP monitor
d. proxy server

d. proxy server

What type of attack are stateless packet filters particularly vulnerable to?
Select one:
a. attempts to connect to the firewall
b. attempts to connect to ports below 1023
c. IP spoofing attacks
d. attempts to connect to ports above 1023

c. IP spoofing attacks

What type of ICMP packet can an attacker use to send traffic to a computer they control outside the protected network?
Select one:
a. Destination Unreachable
b. Echo Request
c. Redirect
d. Source Quench

c. Redirect

Which element of a rule base conceals internal names and IP addresses from users outside the network?
Select one:
a. tracking
b. QoS
c. NAT
d. filtering

c. NAT

Which of the following is a general practice for a rule base?
Select one:
a. permit access to public servers in the DMZ
b. allow direct access from the Internet to computers behind the firewall
c. begin by blocking all traffic and end by allowing selective services
d. allow all access to the firewall

a. permit access to public servers in the DMZ

Which of the following is a method for supporting IPv6 on IPv4 networks until IPv6 is universally adopted?
Select one:
a. IPsec tunneling
b. SMTP/S tunneling
a. permit access to public servers in the DMZ
d. ICMPv6 encapsulation

a. permit access to public servers in the DMZ

Which of the following is a typical drawback of a free firewall program?
Select one:
a. oversimplified configuration
b. have centralized management
c. cannot monitor traffic in real time
d. more expensive than hardware firewalls

c. cannot monitor traffic in real time

Which of the following is an advantage of hardware firewalls?
Select one:
a. not scalable compared to software firewalls
b. not dependent on a conventional OS
c. easy to patch
d. less expensive than software firewalls

b. not dependent on a conventional OS

Which of the following is described as the combination of an IP address and a port number?
Select one:
a. socket
b. subnet
c. portal
d. datagram

a. socket

Which of the following is NOT a criteria typically used by stateless packet filters to determine whether or not to block packets.
Select one:
a. ports
b. TCP flags
c. data patterns
d. IP address

c. data patterns

Which of the following is NOT a protocol,port pair that should be filtered when an attempt is made to make a connection from outside the company network?
Select one:
a. TCP,139
b. TCP,80
c. TCP,3389
d. UDP,138

b. TCP,80

Which of the following is NOT among the common guidelines that should be reflected in the rule base to implement an organization’s security policy?
Select one:
a. employees can have restricted Internet access
b. employees can use instant-messaging only with external network users
c. the public can access the company Web servers
d. only authenticated traffic can access the internal network

b. employees can use instant-messaging only with external network users

Which of the following is NOT an ICMPv6 packet type that you should allow within your organization but never outside the organization?
Select one:
a. Packet too big
b. Packet Redirect
c. Time Exceeded
d. Destination unreachable

b. Packet Redirect

Which two ports should packet-filtering rules address when establishing rules for Web access?
Select one:
a. 143, 80
b. 80, 443
c. 25, 110
d. 423, 88

b. 80, 443

In what type of attack are zombies usually put to use?
Select one:
a. buffer overrun
b. spoofing
c. DDoS
d. virus

c. DDoS

What do you call a firewall that is connected to the Internet, the internal network, and the DMZ?
Select one:
a. multi-zone host
b. three-way packet filter
c. multi-homed proxy
d. three-pronged firewall

d. three-pronged firewall

What is a critical step you should take on the OS you choose for a bastion host?
Select one:
a. customize the OS for bastion operation
b. choose an obscure OS with which attackers are unfamiliar
c. ensure all security patches are installed
d. make sure it is the latest OS version

c. ensure all security patches are installed

What is a step you can take to harden a bastion host?
Select one:
a. open several ports to confuse attackers
b. enable additional services to serve as honeypots
c. remove unnecessary services
d. configure several extra accounts with complex passwords

c. remove unnecessary services

What is the term used for a computer placed on the network perimeter that is meant to attract attackers?
Select one:
a. virtual server
b. bastion host
c. honeypot
d. proxy decoy

c. honeypot

What should you consider installing if you want to inspect packets as they leave the network?
Select one:
a. security workstation
b. reverse firewall
c. filtering proxy router
d. RIP

b. reverse firewall

Where should network management systems generally be placed?
Select one:
a. out of band
b. in the server farm
c. in the DMZ
d. on the perimeter

a. out of band

Which network device works at the Application layer by reconstructing packets and forwarding them to Web servers?
Select one:
a. Layer 7 switch
b. proxy server
c. translating gateway
d. ICMP redirector

b. proxy server

Which of the following best describes a bastion host?
Select one:
a. a host with two or more network interfaces
b. a computer running a standard OS that also has proxy software installed
c. a computer on the perimeter network that is highly protected
d. a computer running only embedded firmware

c. a computer on the perimeter network that is highly protected

Which of the following best describes a DMZ?
Select one:
a. a private subnet that is inaccessible to both the Internet and the company network
b. a subnet of publicly accessible servers placed outside the internal network
c. a network of computers configured with robust firewall software
d. a proxy server farm used to protect the identity of internal servers

b. a subnet of publicly accessible servers placed outside the internal network

Which of the following is a disadvantage of using a proxy server?
Select one:
a. shields internal host IP addresses
b. can’t filter based on packet content
c. slows Web page access
d. may require client configuration

d. may require client configuration

Which of the following is best described as software that prioritizes and schedules requests and then distributes them to servers based on each server’s current load and processing power.
Select one:
a. load-balancing software
b. priority server farm
c. server pooling software
d. traffic distribution filter

a. load-balancing software

Which of the following is true about a dual-homed host?
Select one:
a. it is used as a remote access server in some configurations
b. uses a single NIC to manage two network connections
c. serves as a single point of entry to the network
d. its main objective is to stop worms and viruses

c. serves as a single point of entry to the network

Which of the following is true about a screening router?
Select one:
a. it can stop attacks from spoofed addresses
b. it examines the data in the packet to make filtering decisions
c. it should be combined with a firewall for better security
d. it maintains a state table to determine connection information

c. it should be combined with a firewall for better security

Which of the following is true about private IP addresses?
Select one:
a. they are assigned by the IANA
b. NAT was designed to conserve them
c. they are not routable on the Internet
d. they are targeted by attackers

c. they are not routable on the Internet

Which type of firewall configuration protects public servers by isolating them from the internal network?
Select one:
a. dual-homed host
b. screened subnet DMZ
c. reverse firewall
d. screening router

b. screened subnet DMZ

Which type of NAT is typically used on devices in the DMZ?
Select one:
a. one-to-one NAT
b. many-to-one NAT
c. port address translation
d. one-to-many NAT

a. one-to-one NAT

Which type of security device can speed up Web page retrieval and shield hosts on the internal network?
Select one:
a. caching-only DNS server
b. caching firewall
c. DMZ intermediary
d. proxy server

d. proxy server

Which type of translation should you use if you need 50 computers in the corporate network to be able to access the Internet using a single public IP address?
Select one:
a. one-to-many NAT
b. port address translation
c. one-to-one NAT
d. DMZ proxy translation

b. port address translation

Why is a bastion host the system most likely to be attacked?
Select one:
a. it is available to external users
b. it contains the default administrator account
c. it has weak security
d. it contains company documents

a. it is available to external users

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending