Chapter 6 Quiz – Firewall Configuration and Administration

question

rule set
answer

The cornerstone of most firewalls is the ____, a set of instructions based on organizational policy, configured by the administrator.
question

least privilege
answer

If you decide to first restrict all transmissions through the gateway except a specific set of services, you are following the principle of ____.
question

In Order
answer

The ____ approach processes firewall rules in top-to-bottom order.
question

Best Fit
answer

With the ____ approach, the firewall determines the order in which the rules are processed.
question

Allow-All
answer

A(n) ____ approach allows all packets to pass through except those specified to be blocked.
question

scalable
answer

A firewall must be ____ so its performance can grow along with the network it protects.
question

IP forwarding
answer

If a proxy server is in service, ____ should be disabled on routers and other devices that lie between the networks.
question

16.5 million
answer

The IP range 10.x.x.x provides about ____ addresses.
question

encryption
answer

SSL supports firewall-based ____.
question

MemoryUsage = (ConcurrentConnections)/ (AverageLifetime)*(AverageLifetime + 50 seconds)*120
answer

The formula for calculating memory usage for Check Point’s FW-1 NG firewall is ____.
question

SecurityFocus
answer

____ is the hub for a large mailing list that features frequent announcements about security flaws.
question

Common Vulnerabilities and Exposures Database
answer

____provides a baseline index point for evaluating coverage of tools and services.
question

monthly
answer

It is good practice to set aside time to perform firewall maintenance ____.
question

choose good passwords that you then guard closely
answer

Different types of hardware can be secured in different ways, but one of the most important ways is to ____.
question

Distributed firewalls
answer

____ are installed at all endpoints of the network, including the remote computers that connect to the network through VPNs.
question

GAISP
answer

In 2003, GASSP was succeeded by ____.
question

environmental
answer

GAISP recommends the ____ management of IT assets and resources.
question

BIOS
answer

Having a ____ password in place prevents someone from starting up your computer and accessing your hard disk files with a floppy disk called a boot disk.
question

Caching
answer

____ of frequently accessed resources, such as Web page text and image files, can dramatically speed up the performance of your network because it reduces the load on your Web servers.
question

heartbeat network
answer

____ monitors the operation of the primary firewall and synchronizes the state table connections so the two firewalls have the same information at any given time
question

Open Platform for Security (OPSEC)
answer

The ____ lets you extend their functionality and integrate virus scanning into their set of abilities.

Get instant access to
all materials

Become a Member