Proxy Servers Flashcards
20 test answers
Unlock all answers in this set
Unlock answers 20question
You have used firewalls to create a demilitarized zone. You have a Web server that needs to be accessible to Internet users. The Web server must communicate with a database server for retrieving product, customer, and order information. How should you place devices on the network to best protect the servers?
answer
Put the database server on the private network. Put the Web server on the DMZ.
Unlock the answer
question
Which of the following are characteristics of a circuit-level gateway?
answer
Filters based on sessions. Stateful.
Unlock the answer
question
You administer a Web server on your network. The computer has multiple IP addresses. They are 192.198.23.8 and 192.168.23.17. The name of the computer is www.westsim.com. You configured the Web site as follows: -IP address: 192.168.23.8 -HTTP Port: 1030 -SSL Port: 443Users complain that they can't connect to the Web site when they type www.westsim.com. What is the most likely source of the problem?
answer
The HTTP port should be changed to 80.
Unlock the answer
question
Your company leases a very fast Internet connection and pays for it based on usage. You have been asked by the company to reduce Internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection, without decreasing performance. What is the best way to do this?
answer
Install a proxy server.
Unlock the answer
question
You have a router that is configured as a firewall. The router is a layer 3 device only. Which of the following does the router use for identifying allowed or denied packets?
answer
IP address.
Unlock the answer
question
You are configuring a firewall to allow access to a server hosted on the demilitarized zone on your network. You open TCP/IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?
answer
Web server, e-mail server.
Unlock the answer
question
To increase security on your computer's internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?
answer
443.
Unlock the answer
question
You provide Internet access for a local school. You want to control Internet access based on user, and prevent access to specific URLs. Which type of firewall should you install?
answer
Application level.
Unlock the answer
question
Which of the following does a router acting as a firewall use to control which packets are forwarded or dropped?
answer
ACL.
Unlock the answer
question
You have a company network that is connected to the Internet. You want all users to have Internet access, but need to protect your private network and users. You also need to make a Web server publicly available to Internet users. Which solution should you use?
answer
Use firewalls to create a DMZ. Place the Web server inside the DMZ, and the private network behind the DMZ.
Unlock the answer
question
Which protocol and port is used by BOOTP/DHCP?
answer
UDP 67
Unlock the answer
question
After blocking a number of ports to secure your server, you are unable to send e-mail. To allow e-mail service which of the following needs to be done?
answer
Open port 25 and allow STMP service.
Unlock the answer
question
Which of the following network services or protocols uses TCP/IP port 69?
answer
TFTP.
Unlock the answer
question
How does a proxy server differ from a packet filtering firewall?
answer
A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer.
Unlock the answer
question
Which protocol and port number is used by TFTP?
answer
UDP 69.
Unlock the answer
question
Your company has a connection to the Internet that allows users to access the Internet. You also have a Web server and an e-mail server that you want to make available to Internet users. You want to create a DMZ for these two servers. Which type of device should you use to create the DMZ?
answer
Network based firewall.
Unlock the answer