CHAPTER SUMMARY

An essential element of network security, a firewall is a filtering service used to protect your network and hosts from a variety of threats, both internal and external. Several types of firewalls are available, including screening routers, hardware appliances, and host software products. Each of these firewalls can employ one or more features for ingress and egress filtering. The common filtering features include static packet filtering, stateful inspection or dynamic packet filtering, NAT, application proxy, and circuit proxy.

Firewalls are useful in many different situations. Every network infrastructure can benefit from proper use of a firewall. When making a choice about which firewall to deploy, consider a breadth of options, including the needs of both small and large network environments, host software firewalls, native OS firewalls, third-party OS firewall alternatives, ISP connection device firewalls, commercial firewall options, open-source firewalls, hardware firewalls, next-generation firewalls, and virtual firewalls.

KEY CONCEPTS AND TERMS

CHAPTER 5 ASSESSMENT

  1. Which of the following is true of firewall rules?
    1. Rules follow the allow by default/deny by exception philosophy.
    2. No rules on a firewall are exceptions.
    3. All rules on a firewall are exceptions.
    4. The final rule is that anything that did not match one of the exceptions is allowed by default.
  2. Which of the following attacks is not stopped by a border firewall?
    1. Port scans
    2. Protocol abuses
    3. Inside client to internal host attack
    4. Flooding attacks
  3. Which of the following is not true of firewalls?
    1. A firewall is a type of authentication system.
    2. A firewall can filter traffic.
    3. A firewall can provide routing functions.
    4. A firewall is a traffic control device.
  4. Which of the following best defines ingress filtering?
    1. Blocking traffic leaving a network
    2. Limiting host activities to that host
    3. Monitoring traffic on its way into the network
    4. Denying all traffic to specific ports
  5. What is another name for dynamic packet filtering?
    1. Stateful inspection
    2. Static packet filtering
    3. Structured packet filtering
    4. Sequential inspection
  6. Which of the following is a method of filtering that automatically keeps track of sessions on a limited timeout basis to allow the responses to queries to reach internal systems?
    1. Application filtering
    2. Deep packet inspection
    3. Dynamic packet filtering
    4. Static packet filtering
  7. Which of the following is a form of filtering that allows communication, regardless of whether a session was previously established?
    1. Circuit proxy
    2. Dynamic packet filtering
    3. Deep packet inspection
    4. Stateless filtering
  8. Which activity differentiates a triple-homed firewall from a dual-homed firewall?
    1. Physical isolation of subnets
    2. Deployment of the device as an appliance
    3. Deployment of traffic from the Internet to a DMZ
    4. Filtering of content including attachment deletion
  9. When deploying software firewalls, what is the maximum number that should be operational on a single system at one time?
    1. 1
    2. 2
    3. 5
    4. 10
  10. Which of the following is not a content-filtering method?
    1. Domain name
    2. Source IP address
    3. Keywords in the packet
    4. Filename
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.129.11.20