The dmz can be a dedicated port on the firewall device linking a single bastion host.

1.The DMZ cannot be a dedicated port on the firewall device linking a single bastion host.A) TrueB) False

Points Earned:0.0/10.0Correct Answer(s):FalseFalse, EXTRANETTrue2.Firewalls fall into ____ major processing-mode categories.

3.In addition to recording intrusion attempts, a(n) routercan be configured to use the contact information tonotify the firewall administrator of the occurrence of an intrusion attempt.Points Earned:0.0/10.0

4.A ____ filtering firewall can react to an emergent event and update or create rules to deal with the event.Points Earned:10.0/10.0

5.Good policy and practice dictates that each firewall device, whether a filtering router, bastion host, or otherfirewall implementation, must have its own set of configuration rules.A) TrueB) FalseCorrect Answer(s):TruePoints Earned:0.0/10.0

6.____ inspection firewalls keep track of each network connection between internal and external systems.Points Earned:10.0/10.0

7.When Web services are offered outside the firewall, HTTP traffic should be blocked from internal networksthrough the use of some form of proxy access or DMZ architecture.Points Earned:10.0/10.0

8.____ and TACACS are systems that authenticate the credentials of users who are trying to access anorganization’s network via a dial-up connection.Points Earned:10.0/10.0

9.The ____ is an intermediate area between a trusted network and an untrusted network.A) perimeterB) DMZC) domainD) firewallCorrect Answer(s):BPoints Earned:10.0/10.0

10.Access control is achieved by means of a combination of policies, programs, and technologies.Points Earned:0.0/10.0

1.Even if Kerberos servers are subjected to denial-of-service attacks, a client can request additional services.Points Earned:10.0/10.0

2.Though not used much in Windows environments, Telnet is still useful to systems administrators onUnix/Linux systems.Points Earned:10.0/10.0

3.Kerberos uses asymmetrickey encryption to validate an individual user to various network resources.A) TrueB) False

Points Earned:0.0/10.0Correct Answer(s):False

Question 9(2.5 points)Saved

The DMZ can be a dedicated port on the firewall device linking a single bastion host.

Question 10(2.5 points)SavedA __________ filtering firewall can react to an emergent event and update or create rules to deal withthe event.

Question 11(2.5 points)SavedFirewalls can be categorized by processing mode, development era, or structure.

Question 12(2.5 points)SavedIn most common implementation models, the content filter has two components: __________.Question 12 options:encryption and decryptionfiltering and encodingrating and decryptionrating and filtering

Question 13(2.5 points)Saved

Accountability is the matching of an authenticated entity to a list of information assets andcorresponding access levels.

Question 14(2.5 points)SavedThe screened subnet protects the DMZ systems and information from outside threats by providing anetwork with intermediate security, which means the network is less secure than the general-publicnetworks but more secure than the internal network.

Question 15(2.5 points)Saved__________ and TACACS are systems that authenticate the credentials of users who are trying toaccess an organization’s network via a dial-up connection.

Question 16(2.5 points)SavedThe ability of a router to restrict traffic to a specific service is an advanced capability and notconsidered a standard feature for most routers.Question 16 options:TrueFalse

Is an intermediate area between a trusted network and an untrusted network?

(DeMilitarized Zone) A middle ground between an organization's trusted internal network and an untrusted, external network such as the Internet. Also called a "perimeter network," the DMZ is a subnetwork (subnet) that may sit between firewalls or off one leg of a firewall.

When Web services are offered outside the firewall HTTP traffic should be blocked from internal networks through the use of some form of proxy access?

When Web services are offered outside the firewall, HTTP traffic should be blocked from internal networks through the use of some form of proxy access or DMZ architecture. Good firewall rules include denying all data that is not verifiably authentic. Some firewalls can filter packets by protocol name.

Which of the following service of Kerberos provides tickets to clients who request services?

Kerberos Authentication Service: This service grants the Ticket Granting Ticket (TGT) for clients. Kerberos Ticket Granting Service: This service authenticates the clients based on the TGT.

What the packet filtering firewall checks besides a set of rules to decide whether to block or transfer a packet?

The packet filtering firewall checks access control lists (ACLs) to separate packets depending on the upper-layer protocol ID, source and destination port numbers, source and destination IP addresses, and packet transmission routes.