Chapter 9 Firewalls

Is this your test? Login to manage it. If not, you can create an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which of the following steps of an incident response plan selects and trains security incident response team (SIRT) members and allocates resources?
2.
1 point
All of the following are disadvantages of the build-it-yourself firewall, but one is an advantage. Which of the following is an advantage?
3.
1 point
Which of the following creates TCP and UDP network connections to or from any port?
4.
1 point
Which of the following is a centralized logging service that hosts a duplicate copy of log files?
5.
1 point
Deploying a security product is more preferable than addressing your environment’s specific risks.
6.
1 point
The firewall administrator should give physical access to firewall devices to senior managers and middle managers.
7.
1 point
The Detection phase of an incident response plan confirms breaches.
8.
1 point
Which of the following troubleshooting steps involves reviewing the entire troubleshooting response process?
9.
1 point
Simulator tests are secure by design.
10.
1 point
Which of the following is not a commonsense element of troubleshooting firewalls?
11.
1 point
If strong authentication is a priority, select an application gateway firewall or a dedicated application-specific proxy firewall.
12.
1 point
Which of the following is a double-blind encapsulation system that enables anonymous but not encrypted Internet communications?
13.
1 point
Wireshark is a free packet capture, protocol analyzer, and sniffer that can
analyze packets and frames as they enter or leave a firewall.
14.
1 point
Which of the following is a malicious remote control tool?
15.
1 point
Which of the following is disabled by default and requires an invitation?
16.
1 point
A deny by default/allow by exception philosophy means that we deny access to ports and objects that we know people don't need to access while allowing all other access.
17.
1 point
When troubleshooting firewalls, you should simplify the task by first disabling or disconnecting software and hardware not essential to the function of the firewall.
18.
1 point
When troubleshooting firewalls, which of the following is not something you should do after you attempt a fix?
19.
1 point
Which of the following is a network mapper, port scanner, and OS fingerprinting tool that checks the state of ports, identifies targets, and probes services?
20.
1 point
Which of the following is not a document that can help you to review and assess your organization’s status and state of security?
21.
1 point
Which of the following is not a protection against fragmentation attacks?
22.
1 point
PacketiX VPN and HotSpotShield are encrypted Web proxy services.
23.
1 point
The Containment phase of an incident response plan restrains further escalation of the incident.
24.
1 point
Which of the following uses ICMP as a tunneling protocol?
25.
1 point
In a company network setting, you should immediately terminate any communication found to take place without firewall filtering.