Search Header Logo

COM221 Module9

Authored by Katrina Weicht

Computers

University

Used 1+ times

COM221 Module9
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT a firewall rule parameter?

Visibility

Time

Context

Action

Answer explanation

a. Correct. There is no visibility firewall parameter.

b. Incorrect. Rules can be set to only be active during a scheduled time.

c. Incorrect. A rule can be created that is unique for specific circumstances (contexts). For example, different rules may be in effect depending on whether a laptop is on-site or is remote (sometimes called geographical consideration).

d. Incorrect. The action setting indicates what the firewall should do when the conditions of the rule are met.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which firewall rule action implicitly denies all other traffic unless explicitly allowed?

Force Allow

Force Deny

Bypass

Allow

Answer explanation

a. Incorrect. Force Allow permits traffic that would normally be denied by other rules.

b. Incorrect. This is fictitious and does not exist.

c. Incorrect. Bypass allows all traffic to bypass the firewall.

d. Correct. Allow implicitly denies all other traffic unless explicitly allowed.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Leah is researching information on firewalls. She needs a firewall that allows for more generic statements instead of creating specific rules. What type of firewall should Leah consider purchasing that supports her need?

Content/URL filtering firewall

Policy-based firewall

Hardware firewall

Proprietary firewall

Answer explanation

a. Incorrect. Firewalls can also apply content/URL filtering. The firewall can be used to monitor websites accessed through HTTP to create custom filtering profiles. The filtering can be performed by assessing webpages by their content category, and then create whitelists and blacklists of specific URLs.

b. Correct. A more flexible type of firewall than a rule-based firewall is a policy-based firewall. This type of firewall allows for more generic statements to be used instead of specific rules.

c. Incorrect. Hardware firewalls are specialized separate devices that inspect traffic. Because they are specialized devices, hardware firewalls tend to have more features but are more expensive and can require more effort to configure and manage.

d. Incorrect. Firewalls that are owned by an entity that has an exclusive right to them are called proprietary firewalls.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this?

Stateful packet filtering

Connection-aware firewall

Proxy firewall

Packet filtering firewall

Answer explanation

a. Correct. Stateful packet filtering uses both the firewall rules and the state of the connection: that is, whether the internal device requested each packet. A stateful packet filtering firewall keeps a record of the state of a connection between an internal endpoint and an external device.

b. Incorrect. This is fictitious and does not exist.

c. Incorrect. This is fictitious and does not exist.

d. Incorrect. This is fictitious and does not exist.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a virtual firewall?

A firewall that runs in the cloud

A firewall that runs in an endpoint virtual machine

A firewall that blocks only incoming traffic

A firewall appliance that runs on a LAN

Answer explanation

a. Correct. A virtual firewall is one that runs in the cloud. Virtual firewalls are designed for settings, such as public cloud environments, in which deploying an appliance firewall would be difficult or even impossible.

b. Incorrect. A firewall that runs in an endpoint virtual machine is a host firewall.

c. Incorrect. Firewalls block both incoming and outgoing traffic.

d. Incorrect. An appliance firewall is typically a separate hardware device designed to protect an entire network.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of these appliances provides the broadest protection by combining several security functions?

NAT

WAF

UTM

NGFW

Answer explanation

a. Incorrect. Network address translation (NAT) is a technique that allows private IP addresses to be used on the public Internet. It does this by replacing a private IP address with a public IP address: as a packet leaves a network, NAT removes the private IP address from the sender’s packet, replaces it with an alias IP public address, and then maintains a record of the substitution; when a packet is returned, the process is reversed.

b. Incorrect. One specialized firewall is a web application firewall (WAF) that looks at the applications using HTTP. A web application firewall, which can be a separate hardware appliance or a software plug-in, can block specific websites or attacks that attempt to exploit known vulnerabilities in specific client software and can even block cross-site scripting and SQL injection attacks.

c. Correct. Unified threat management (UTM) is a device that combines several security functions. These include packet filtering, antispam, antiphishing, antispyware, encryption, intrusion protection, and web filtering.

d. Incorrect. A next generation firewall (NGFW) has additional functionality beyond a traditional firewall. NGFWs can filter packets based on applications. NGFWs have visibility of applications by using deep packet inspection and thus can examine the payloads of packets and determine if they are carrying malware. In addition to basic firewall protections, filtering by applications, and deep packet inspection, NGFWs can also perform URL filtering and intrusion prevention services.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following contains honeyfiles and fake telemetry?

High-interaction honeypot

Attacker-interaction honeypot

Honeypotnet

Honeyserver

Answer explanation

a. Correct. A high-interaction honeypot is designed for capturing much more information from the threat actor. Usually, it is configured with a default login and loaded with software, data files that appear to be authentic but are actually imitations of real data files (honeyfiles), and fake telemetry.

b. Incorrect. This is fictitious and does not exist.

c. Incorrect. This is fictitious and does not exist.

d. Incorrect. This is fictitious and does not exist.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers