1: | List three types of firewalls. |
A1: | Answer: Three firewall types include hardware, software, and personal. |
2: | A TCP SYN flood attack is a form of DoS attack, which randomly opens up a number of TCP ports. True or False? |
A2: | Answer: True. |
3: | List the three types of inspection methodologies. |
A3: | Answer: Three types of inspection methodologies are packet filtering and stateless filtering, stateful filtering, and deep packet layer inspection. |
4: | A stateless firewall can also inspect data content and check for protocol anomalies. True or False? |
A4: | Answer: False. |
5: | What are the two main interfaces of a PIX Firewall? |
A5: | Answer: The two main interfaces of a PIX Firewall are the inside interface and the outside interface. |
6: | The PIX Firewall uses a proprietary algorithm. Which one? |
A6: | Answer: The PIX Firewall uses the Adaptive Security Algorithm (ASA) proprietary algorithm. ASA is the decision-making part of the PIX. |
7: | Which of the following PIX interface security levels is valid?
|
A7: | Answer: b. The valid PIX interface security level is Inside 100, Outside 0, DMZ 199. |
8: | Which of the following devices are stateless?
|
A8: | Answer: d. The router with ACLs is stateless. |
9: | What is NAT, and when is it used? |
A9: | Answer: NAT stands for Network Address Translation. NAT is typically used for internal IP networks that have unregistered (not globally unique) IP addresses. |
10: | Content filtering or URL filtering occurs at what layer of the OSI reference model?
|
A10: | Answer: d. Content filtering or URL filtering occurs at Layer 7 of the OSI reference model. |