
Networking 3/4 Chapter 6 Test Review
Authored by Bradford Scott
Computers
9th - 12th Grade
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
28 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is true about a firewall?
You must manually specify which traffic you want to allow through the firewall. Everything else is blocked.
Firewalls protect against email spoofing attacks.
Host-based firewalls and network-based firewalls can be installed separately, but they cannot be placed together to provide multiple layers of protection.
Implicit deny is used to deny permissions to a specific user even when the rest of the user's group is allowed access.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following combines several layers of security services and network functions into one piece of hardware?
Firewall
Circuit-level gateway
Unified Threat Management (UTM)
Intrusion detection system (IDS)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a proxy server differ from a packet-filtering firewall?
A proxy server includes filters for the session ID as well as the IP address and port number.
A proxy server operates at the Application layer, while a packet-filtering firewall operates at the Network layer.
A proxy server is used to create a screened subnet, while a packet-filtering firewall can only be used with screened subnets.
A proxy server can prevent unknown network attacks, while a packet-filtering firewall can only prevent known attacks.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have been given a laptop to use for work. You connect the laptop to your company network, use the laptop from home, and use it while traveling. You want to protect the laptop from internet-based attacks. Which solution should you use?
Network-based firewall
VPN concentrator
Host-based firewall
Proxy server
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is another name for a firewall that performs router functions?
Screening router
Screened subnet
Screened-host gateway
Dual-homed gateway
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
You have used firewalls to create a screened subnet. You have a web server that needs to be accessible to internet users. The web server must communicate with a database server to retrieve product, customer, and order information. How should you place devices on the network to best protect the servers? (Select two.)
Put the web server on the private network.
Put the database server outside the screened subnet.
Put the web server inside the screened subnet.
Put the database server inside the screened subnet.
Put the database server on the private network.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following does the sudo iptables -F command accomplish?
Saves changes to iptables.
Drops all incoming traffic.
Clears all the current rules.
Lists all the current rules.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?