Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Chapter 9 Q&A

1:

List three types of firewalls.

A1:

Answer: Three firewall types include hardware, software, and personal.

2:

A TCP SYN flood attack is a form of DoS attack, which randomly opens up a number of TCP ports. True or False?

A2:

Answer: True.

3:

List the three types of inspection methodologies.

A3:

Answer: Three types of inspection methodologies are packet filtering and stateless filtering, stateful filtering, and deep packet layer inspection.

4:

A stateless firewall can also inspect data content and check for protocol anomalies. True or False?

A4:

Answer: False.

5:

What are the two main interfaces of a PIX Firewall?

A5:

Answer: The two main interfaces of a PIX Firewall are the inside interface and the outside interface.

6:

The PIX Firewall uses a proprietary algorithm. Which one?

A6:

Answer: The PIX Firewall uses the Adaptive Security Algorithm (ASA) proprietary algorithm. ASA is the decision-making part of the PIX.

7:

Which of the following PIX interface security levels is valid?

  1. Inside 0, Outside 100, DMZ 199

  2. Inside 100, Outside 0, DMZ 199

  3. Inside 100, Outside 0, DMZ 0

  4. Inside 0, Outside 1-99, DMZ 100

A7:

Answer: b. The valid PIX interface security level is Inside 100, Outside 0, DMZ 199.

8:

Which of the following devices are stateless?

  1. PIX

  2. NetScreen

  3. Check Point

  4. Router with ACLs

A8:

Answer: d. The router with ACLs is stateless.

9:

What is NAT, and when is it used?

A9:

Answer: NAT stands for Network Address Translation. NAT is typically used for internal IP networks that have unregistered (not globally unique) IP addresses.

10:

Content filtering or URL filtering occurs at what layer of the OSI reference model?

  1. Layer 3

  2. Layer 4

  3. Layer 6

  4. Layer 7

A10:

Answer: d. Content filtering or URL filtering occurs at Layer 7 of the OSI reference model.


/ 196