If a firewall receives a suspicious packet, the firewall will ________.
-log the packet
-drop the packet
-Both log the packet and drop the packet
-Neither log the packet nor drop the packet - Answer -Neither log the packet nor drop
the packet
In ________ filtering, the firewall filters packets when they are leaving the network.
-ingress
-egress
-Both ingress and egress
-Neither ingress nor egress - Answer -ingress
Most packets are part of the ________ state.
-connection opening
-connection closing
-Both connection opening and connection closing
-Neither connection opening nor connection closing - Answer -Neither connection
opening nor connection closing
Static packet filtering is sometimes used ________.
-as a secondary filtering mechanism on an application proxy firewall
-on border routers
-Both as a secondary filtering mechanism on an application proxy firewall and on border
routers
-Neither as a secondary filtering mechanism on an application proxy firewall nor on
border routers - Answer -Both as a secondary filtering mechanism on an application
proxy firewall and on border routers
Firewalls will drop ________.
-suspicious packets
-provable attack packets
-Both suspicious packets and provable attack packets
-Neither suspicious packets nor provable attack packets - Answer -provable attack
packets
If a firewall cannot keep up with traffic volume, it will ________.
-continue passing all packets but slow operation
-drop packets it cannot process
-pass any packets it cannot filter
-shut down, failing safely - Answer -drop packets it cannot process
, SPI firewalls can conduct ________ inspection.
-stateful packet
-static packet filtering
-Both stateful packet and static packet filtering
-Neither stateful packet nor static packet filtering - Answer -Both stateful packet and
static packet filtering
A connection designates a specific program designated by a port number on a specific
computer's IP address.
- True
-False - Answer -False
An internal firewall sits at the boundary between the corporate site and the Internet.
-True
-False - Answer -False
________ firewalls filter traffic passing between different parts of a site's network.
-Border
-Internal
-Intermediate
-None of these - Answer -Internal
A border firewall sits at the boundary between the corporate site and the external
Internet.
-True
-False - Answer -True
A ________ is a persistent conversation between different programs on different
computers.
-connection
-state
-Both connection and state
-Neither connection nor state - Answer -connection
A ________ firewall handling all traditional firewall functions (SPI, ACLs, etc.) as well as
additional security functions such as antivirus filtering, spam filtering, application proxy
filtering, and so forth.
-unified threat management
-stateful packet inspection
-static packet inspection
-None of these - Answer -unified threat management
CLI shells use more system resources than GUIs.
-True
-False - Answer -False