Which of the following is NOT a firewall rule parameter?

COM221 Module9

Quiz
•
Computers
•
University
•
Hard

Katrina Weicht
Used 1+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Visibility
Time
Context
Action
Answer explanation
a. Correct. There is no visibility firewall parameter.
b. Incorrect. Rules can be set to only be active during a scheduled time.
c. Incorrect. A rule can be created that is unique for specific circumstances (contexts). For example, different rules may be in effect depending on whether a laptop is on-site or is remote (sometimes called geographical consideration).
d. Incorrect. The action setting indicates what the firewall should do when the conditions of the rule are met.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which firewall rule action implicitly denies all other traffic unless explicitly allowed?
Force Allow
Force Deny
Bypass
Allow
Answer explanation
a. Incorrect. Force Allow permits traffic that would normally be denied by other rules.
b. Incorrect. This is fictitious and does not exist.
c. Incorrect. Bypass allows all traffic to bypass the firewall.
d. Correct. Allow implicitly denies all other traffic unless explicitly allowed.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Leah is researching information on firewalls. She needs a firewall that allows for more generic statements instead of creating specific rules. What type of firewall should Leah consider purchasing that supports her need?
Content/URL filtering firewall
Policy-based firewall
Hardware firewall
Proprietary firewall
Answer explanation
a. Incorrect. Firewalls can also apply content/URL filtering. The firewall can be used to monitor websites accessed through HTTP to create custom filtering profiles. The filtering can be performed by assessing webpages by their content category, and then create whitelists and blacklists of specific URLs.
b. Correct. A more flexible type of firewall than a rule-based firewall is a policy-based firewall. This type of firewall allows for more generic statements to be used instead of specific rules.
c. Incorrect. Hardware firewalls are specialized separate devices that inspect traffic. Because they are specialized devices, hardware firewalls tend to have more features but are more expensive and can require more effort to configure and manage.
d. Incorrect. Firewalls that are owned by an entity that has an exclusive right to them are called proprietary firewalls.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this?
Stateful packet filtering
Connection-aware firewall
Proxy firewall
Packet filtering firewall
Answer explanation
a. Correct. Stateful packet filtering uses both the firewall rules and the state of the connection: that is, whether the internal device requested each packet. A stateful packet filtering firewall keeps a record of the state of a connection between an internal endpoint and an external device.
b. Incorrect. This is fictitious and does not exist.
c. Incorrect. This is fictitious and does not exist.
d. Incorrect. This is fictitious and does not exist.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is a virtual firewall?
A firewall that runs in the cloud
A firewall that runs in an endpoint virtual machine
A firewall that blocks only incoming traffic
A firewall appliance that runs on a LAN
Answer explanation
a. Correct. A virtual firewall is one that runs in the cloud. Virtual firewalls are designed for settings, such as public cloud environments, in which deploying an appliance firewall would be difficult or even impossible.
b. Incorrect. A firewall that runs in an endpoint virtual machine is a host firewall.
c. Incorrect. Firewalls block both incoming and outgoing traffic.
d. Incorrect. An appliance firewall is typically a separate hardware device designed to protect an entire network.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of these appliances provides the broadest protection by combining several security functions?
NAT
WAF
UTM
NGFW
Answer explanation
a. Incorrect. Network address translation (NAT) is a technique that allows private IP addresses to be used on the public Internet. It does this by replacing a private IP address with a public IP address: as a packet leaves a network, NAT removes the private IP address from the sender’s packet, replaces it with an alias IP public address, and then maintains a record of the substitution; when a packet is returned, the process is reversed.
b. Incorrect. One specialized firewall is a web application firewall (WAF) that looks at the applications using HTTP. A web application firewall, which can be a separate hardware appliance or a software plug-in, can block specific websites or attacks that attempt to exploit known vulnerabilities in specific client software and can even block cross-site scripting and SQL injection attacks.
c. Correct. Unified threat management (UTM) is a device that combines several security functions. These include packet filtering, antispam, antiphishing, antispyware, encryption, intrusion protection, and web filtering.
d. Incorrect. A next generation firewall (NGFW) has additional functionality beyond a traditional firewall. NGFWs can filter packets based on applications. NGFWs have visibility of applications by using deep packet inspection and thus can examine the payloads of packets and determine if they are carrying malware. In addition to basic firewall protections, filtering by applications, and deep packet inspection, NGFWs can also perform URL filtering and intrusion prevention services.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following contains honeyfiles and fake telemetry?
High-interaction honeypot
Attacker-interaction honeypot
Honeypotnet
Honeyserver
Answer explanation
a. Correct. A high-interaction honeypot is designed for capturing much more information from the threat actor. Usually, it is configured with a default login and loaded with software, data files that appear to be authentic but are actually imitations of real data files (honeyfiles), and fake telemetry.
b. Incorrect. This is fictitious and does not exist.
c. Incorrect. This is fictitious and does not exist.
d. Incorrect. This is fictitious and does not exist.
Create a free account and access millions of resources
Similar Resources on Quizizz
19 questions
Windows Active Directory

Quiz
•
University - Professi...
15 questions
CNET151 - Chapt 9 - Computer Security Technology

Quiz
•
University
20 questions
MTA: 98-367 Security Part 1

Quiz
•
KG - Professional Dev...
20 questions
IT Essentials Ch 6 Review - Applied Networking

Quiz
•
9th Grade - University
17 questions
Next Generation Firewalls

Quiz
•
University
25 questions
Cloud Infrastructure Mechanisms

Quiz
•
University
18 questions
SC-900 BootCamp

Quiz
•
University
15 questions
Google Prof Cloud Network - pt 5

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade