
5.4 Review
Authored by Joanna Hovis
Education
12th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If the primary concern is to secure against application-specific attacks, which of the following strategies should the network security engineer consider implementing?
Deploy Layer 7 firewalls on all network edges
Use Layer 4 firewalls for all internet-facing applications
Rely solely on Layer 4 firewalls for internal traffic
Deploy Layer 4 firewalls on all network edges
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A company's web server is openly accessible to the internet, demanding heightened security measures. Considering the need for essential protocols and the introduction of a screened subnet, how should the company configure the firewall's access control lists (ACLs)?
Block all ports and protocols; enable a screened subnet for the server.
Allow all ports and protocols; do not create a screened subnet.
Permit only FTP, SSH, and enable File Integrity Monitoring; disregard screened subnet implementation.
Permit Hypertext Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure (HTTPS) on firewall access control lists (ACLs); establish a screened subnet for the web server.
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A cyber team implements new hardening techniques after a data loss prevention (DLP) audit revealed increased data exfiltration. What is a tenet of host-based firewalls?
It provides controls for incoming and outgoing network traffic.
It describes software tools that monitor and protect individual hosts.
It uses signature-based detection and anomaly detection.
It requires deploying and configuring specialized software agents.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A newly established e-commerce company experienced increased web-based attacks on its online shopping platform. As a result, the company installed a Web Application Firewall (WAF) to enhance its security infrastructure. What primary function should the network security manager ensure the WAF is performing to protect the online platform from the MOST common types of web-based threats, such as Cross-site Scripting (XSS), Structured Query Language (SQL) Injection, and Cross-site Request Forgery?
Monitor traffic and block DDoS attacks
Encrypt data in transit
Validate input and output
Inspect HTTPS traffic
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following are features of an application-level gateway? (Select two.)
Reassembles entire messages
Verifies that packets are properly sequenced
Uses access control lists
Stops each packet at the firewall for inspection
Allows only valid packets within approved sessions
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A network security administrator's responsibilities include enhancing the enterprise's network infrastructure security posture. They deploy a Next Generation Firewall (NGFW) as part of their defense strategy. The enterprise mixes internal and external services, including a web application and a virtual private network (VPN) for remote access. Which of the following should the administrator primarily consider when implementing the NGFW to ensure effective security without disrupting normal operations?
Deploy the NGFW in inline mode, ensuring it analyzes all traffic while maintaining connectivity.
Position the NGFW as a jump server to manage secure access for all network services.
Set the NGFW to operate in a fail-open mode, ensuring continuous network service even if the firewall fails.
Use the NGFW as a load balancer, distributing network traffic across multiple servers.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security architect designs a solution to protect the organization's network from advanced threats and provides granular access controls based on user roles. The organization has a significant volume of TLS-encrypted traffic that needs inspection and wants to integrate the solution with its network directory for role-based content filtering. Which of the following should the security architect consider the MOST appropriate option?
A standard stateful firewall with Layer 4 filtering capabilities
A jump server with enhanced remote access capabilities
A Web Application Firewall (WAF) designed primarily to protect web applications from targeted attacks
A Next Generation Firewall (NGFW) with Layer 7 application-aware filtering and intrusion prevention system (IPS) functionality
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
PRUEBA DE AVANCE V1 - ING-SOC
Quiz
•
12th Grade
20 questions
FUCIONES VITALES
Quiz
•
12th Grade - University
20 questions
Kemagnetan
Quiz
•
12th Grade - University
20 questions
LO EDB
Quiz
•
9th - 12th Grade
20 questions
Reforzamiento TI LMIII
Quiz
•
12th Grade
20 questions
KUIZ SENI PERSEMBAHAN SEMESTER II TINGKATAN 1 2023
Quiz
•
9th - 12th Grade
20 questions
Statistics
Quiz
•
10th - 12th Grade
20 questions
La melodia (control)
Quiz
•
12th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade