Requires Client Modification Please identify the primary classifications of network firewall types: (Choose all that apply) Packet-filtering firewalls (Stateful & Nonstateful)Ĭircuit-level gateways In the scenario where multiple network security units could process traffic and serve as backup units as Still a relatively high level of granularity. Disadvantages of Circuit Proxy Firewalls: (Choose all that apply) No anti-spoofing Please select the best two descriptions of security controls: Controls may be procedures / processesĬontrols may be physical The most common weakest link for any organization is: its employees. Port Number Controls should be placed to implement and enforce policies. Please choose the parameter types: (Choose five) Source Address False Firewalls could control access based on a number of parameters, dependant upon the type of firewall. e-mail notification Firewalls are the only security appliance requried to create a complete Information Protection Program (IPP). Paging notification The firewall simply would send an e-mail to an appropriate e-mail address when an event has occurred. Simple Network Management Protocol (SNMP) notification When an event occurs, the firewall could be configured to send a page to an administrator. Console notification Could be used to generate traps that are sent to a network management system (NMS) that is monitoring a firewall. True Fire Wall Authentication refers to: Username & ID password Simple process of presenting a notification to the console. A firewall might protect the network and data from attack vectors that initate from the Internet. SOCKS 5 allow optional user authentication & encryptionĬlient has no way to learn the server IP address Packet Inspection is the process of intercepting & processing the data in a packet to determine if it should be permitted or denied. The firewall can "translate" internal "Private" Addresses to "Public" Addresses before sending them out to the Internet, "hiding" the internal addresses Advantages of Circuti Proxy Firewalls: (Choose all that apply): More control than a Packet Filter No need to re-number internal networks, if set up per IETF RFC-1918 Large internal networks can operate with only a few "Public" Addresses Restrict Packet Motives are solely isolated to a cybe attacker who desires to compormise a system whether it is a targeted system or untargeted system False Network Address Translation (NAT) : (Choose all that apply) Allows use of "Private" Addresses on the internal network. Dependant upon the type of firewall, actions taken by firewalls include: (Choose all that apply) Block Packets
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |