Chapter 6 Quiz – Firewall Configuration and Administration – Flashcards

Unlock all answers in this set

Unlock answers
question
The cornerstone of most firewalls is the ____, a set of instructions based on organizational policy, configured by the administrator.
answer
rule set
question
If you decide to first restrict all transmissions through the gateway except a specific set of services, you are following the principle of ____.
answer
least privilege
question
The ____ approach processes firewall rules in top-to-bottom order.
answer
In Order
question
With the ____ approach, the firewall determines the order in which the rules are processed.
answer
Best Fit
question
A(n) ____ approach allows all packets to pass through except those specified to be blocked.
answer
Allow-All
question
A firewall must be ____ so its performance can grow along with the network it protects.
answer
scalable
question
If a proxy server is in service, ____ should be disabled on routers and other devices that lie between the networks.
answer
IP forwarding
question
The IP range 10.x.x.x provides about ____ addresses.
answer
16.5 million
question
SSL supports firewall-based ____.
answer
encryption
question
The formula for calculating memory usage for Check Point's FW-1 NG firewall is ____.
answer
MemoryUsage = (ConcurrentConnections)/ (AverageLifetime)*(AverageLifetime + 50 seconds)*120
question
____ is the hub for a large mailing list that features frequent announcements about security flaws.
answer
SecurityFocus
question
____provides a baseline index point for evaluating coverage of tools and services.
answer
Common Vulnerabilities and Exposures Database
question
It is good practice to set aside time to perform firewall maintenance ____.
answer
monthly
question
Different types of hardware can be secured in different ways, but one of the most important ways is to ____.
answer
choose good passwords that you then guard closely
question
____ are installed at all endpoints of the network, including the remote computers that connect to the network through VPNs.
answer
Distributed firewalls
question
In 2003, GASSP was succeeded by ____.
answer
GAISP
question
GAISP recommends the ____ management of IT assets and resources.
answer
environmental
question
Having a ____ password in place prevents someone from starting up your computer and accessing your hard disk files with a floppy disk called a boot disk.
answer
BIOS
question
____ of frequently accessed resources, such as Web page text and image files, can dramatically speed up the performance of your network because it reduces the load on your Web servers.
answer
Caching
question
____ monitors the operation of the primary firewall and synchronizes the state table connections so the two firewalls have the same information at any given time
answer
heartbeat network
question
The ____ lets you extend their functionality and integrate virus scanning into their set of abilities.
answer
Open Platform for Security (OPSEC)
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New