Network Security Fundamentals [Electronic resources]

Gert De Laet, Gert Schauwers

نسخه متنی -صفحه : 196/ 83
نمايش فراداده

Q&A

1:

List three types of firewalls.

2:

A TCP SYN flood attack is a form of DoS attack, which randomly opens up a number of TCP ports. True or False?

3:

List the three types of inspection methodologies.

4:

A stateless firewall can also inspect data content and check for protocol anomalies. True or False?

5:

What are the two main interfaces of a PIX Firewall?

6:

The PIX Firewall uses a proprietary algorithm. Which one?

7:

Which of the following PIX interface security levels is valid?

  1. Inside 0, Outside 100, DMZ 199

  2. Inside 100, Outside 0, DMZ 199

  3. Inside 100, Outside 0, DMZ 0

  4. Inside 0, Outside 1-99, DMZ 100

8:

Which of the following devices are stateless?

  1. PIX

  2. NetScreen

  3. Check Point

  4. Router with ACLs

9:

What is NAT, and when is it used?

10:

Content filtering or URL filtering occurs at what layer of the OSI reference model?

  1. Layer 3

  2. Layer 4

  3. Layer 6

  4. Layer 7