1.
The application firewall runs special software that acts as a proxy for a service request.
Correct Answer
A. True
Explanation
An application firewall is a type of firewall that specifically focuses on protecting a specific application or service. It acts as a proxy by intercepting and filtering all incoming and outgoing traffic to that application. By doing so, it can analyze the data packets and enforce security policies to prevent unauthorized access or malicious activities. Therefore, the statement "The application firewall runs special software that acts as a proxy for a service request" is true.
2.
One method of protecting the residential user is to install a software firewall directly on the user's system.
Correct Answer
A. True
Explanation
Installing a software firewall directly on the user's system is an effective method of protecting the residential user. A software firewall acts as a barrier between the user's device and the external network, monitoring and controlling incoming and outgoing network traffic. It can detect and block unauthorized access attempts, malicious software, and other threats, enhancing the security of the user's system. By having a software firewall installed, the user has an additional layer of protection against potential cyber attacks and can have more control over their network connections.
3.
All organizations with an Internet connection have some form of a router at the boundary between the organization's internal networks and the external service provider.
Correct Answer
B. False
Explanation
The statement suggests that all organizations with an internet connection have a router at the boundary between their internal networks and the external service provider. However, this statement is not true. While many organizations do have routers at their network boundaries, it is not a requirement for all organizations with internet connections. Some organizations may use other networking devices or configurations to manage their network connections. Therefore, the correct answer is false.
4.
Firewall Rule Set 1 states that responses to internal requests are not allowed.
Correct Answer
B. False
Explanation
The statement in Firewall Rule Set 1 is false. It states that responses to internal requests are not allowed, which means that the firewall would block any response to a request made from within the internal network. However, this would not be a practical rule to have in place as it would prevent any communication or data transfer within the network. Therefore, the correct answer is false.
5.
It is important that e-mail traffic reach your e-mail server and only your e-mail server.
Correct Answer
A. True
Explanation
It is important for e-mail traffic to reach only the designated e-mail server to ensure security and prevent unauthorized access to sensitive information. If e-mail traffic is not restricted to the designated server, it can be intercepted or redirected to unauthorized servers, leading to potential data breaches or unauthorized access to confidential information. Therefore, it is crucial to ensure that e-mail traffic is directed solely to the intended e-mail server.
6.
The restrictions most commonly implemented in packet-filtering firewalls are based on ____.
Correct Answer
D. All of the above
Explanation
Packet-filtering firewalls commonly implement restrictions based on IP source and destination address, direction (inbound or outbound), and TCP or UDP source and destination port requests. This means that the firewall can filter and control network traffic by examining these factors. By considering all of these aspects, the firewall can effectively control and secure the network by allowing or blocking certain packets based on their source and destination addresses, the direction of the traffic, and the specific ports being used.
7.
A ____ filtering firewall can react to an emergent event and update or create rules to deal with the event.
Correct Answer
A. Dynamic
Explanation
A dynamic filtering firewall is capable of responding to an emergent event by updating or creating rules to address the event. This means that it can adapt and modify its rules in real-time based on the current situation, allowing it to effectively handle unexpected or changing threats. Unlike static filtering firewalls, which have predefined rules that cannot be altered on the fly, a dynamic filtering firewall offers greater flexibility and responsiveness in dealing with emerging security issues. Stateful and stateless firewalls, on the other hand, do not specifically emphasize the ability to react and update rules in response to emergent events.
8.
____ inspection firewalls keep track of each network connection between internal and external systems.
Correct Answer
C. Stateful
Explanation
Stateful inspection firewalls keep track of each network connection between internal and external systems. Unlike stateless firewalls, which only examine individual packets, stateful firewalls maintain information about the state of each connection. This allows the firewall to make more informed decisions about whether to allow or block traffic based on the context of the entire connection. By keeping track of the state of connections, stateful inspection firewalls provide better security and can detect and prevent various types of attacks, such as session hijacking or unauthorized access.
9.
The application gateway is also known as a(n) ____.
Correct Answer
A. Application-level firewall
Explanation
The application gateway is also known as an application-level firewall because it operates at the application layer of the network stack. It monitors and filters incoming and outgoing network traffic based on specific application protocols and rules. This allows it to provide more granular control and security for applications, protecting them from various types of attacks and unauthorized access.
10.
The proxy server is often placed in an unsecured area of the network or is placed in the ____ zone.
Correct Answer
C. Demilitarized
Explanation
A proxy server is commonly placed in a demilitarized zone (DMZ) to enhance network security. A DMZ is a neutral area between the internal network and the external network, typically containing servers that need to be accessed by external users. By placing the proxy server in the DMZ, it acts as a buffer between the internal network and the external network, providing an additional layer of protection against potential threats. This setup allows the proxy server to filter and manage incoming and outgoing network traffic, ensuring that only authorized and safe connections are established.
11.
The ____ is an intermediate area between a trusted network and an untrusted network.
Correct Answer
B. DMZ
Explanation
A DMZ (demilitarized zone) is an intermediate area between a trusted network and an untrusted network. It acts as a buffer zone, providing an additional layer of security by separating the trusted internal network from the untrusted external network. The DMZ typically contains servers or systems that need to be accessible from both networks, such as web servers or email servers. By placing these systems in the DMZ, organizations can limit the potential damage that could occur if they were compromised, as they are isolated from the internal network where sensitive data and resources are stored.
12.
In recent years, the broadband router devices that can function as packet-filtering firewalls have been enhanced to combine the features of ____.
Correct Answer
D. WAPs
Explanation
Broadband router devices have been enhanced to combine the features of WAPs, or Wireless Access Points. This means that these routers not only provide internet connectivity but also allow wireless devices to connect to the network. By combining the features of WAPs, the router can provide both wired and wireless connectivity, making it more versatile and convenient for users.
13.
The dominant architecture used to secure network access today is the ____ firewall.
Correct Answer
D. Screened subnet
Explanation
The dominant architecture used to secure network access today is the screened subnet firewall. This type of firewall is designed to create a secure network environment by placing a firewall between the internal network and the external network. It acts as a barrier, inspecting and filtering incoming and outgoing traffic based on predetermined security rules. The screened subnet architecture provides an additional layer of protection by adding an extra network segment, known as a DMZ (demilitarized zone), which separates the internal network from the external network. This setup helps prevent unauthorized access and potential attacks from reaching the internal network.
14.
Telnet protocol packets usually go to TCP port ____.
Correct Answer
D. 23
Explanation
The correct answer is 23. Telnet protocol packets typically go to TCP port 23.
15.
____ is the protocol for handling TCP traffic through a proxy server.
Correct Answer
A. Socks
Explanation
Socks is the protocol for handling TCP traffic through a proxy server. It allows clients to establish a connection to a proxy server and then request the proxy server to forward the TCP traffic to the destination server. This enables clients to access resources on the internet indirectly through the proxy server, providing a layer of anonymity and security. Socks is commonly used for activities such as bypassing firewalls or accessing restricted content.
16.
ICMP uses port ____ to request a response to a query and can be the first indicator of a malicious attack.
Correct Answer
B. 7
Explanation
ICMP (Internet Control Message Protocol) is a network protocol used for diagnostic and error reporting purposes. It is commonly used for ping requests to check the availability of a host on a network. ICMP requests a response to a query using port 7, known as the Echo protocol. This port can be the first indicator of a malicious attack because attackers may use ICMP packets to perform reconnaissance or launch a denial-of-service attack. Therefore, the correct answer is 7.
17.
____ and TACACS are systems that authenticate the credentials of users who are trying to access an organization's network via a dial-up connection.
Correct Answer
A. Radius
Explanation
Radius is a system that is commonly used for authentication, authorization, and accounting (AAA) services in network environments. It is specifically designed for remote access authentication, including dial-up connections. When a user tries to access an organization's network via a dial-up connection, Radius is responsible for verifying their credentials and granting or denying access based on the authentication process. Therefore, Radius is the correct answer for this question.
18.
Which of the following is a valid version of TACACS?
Correct Answer
D. ALL OF THE ABOVE
Explanation
All of the options provided are valid versions of TACACS. TACACS, EXTENDED TACACS, and TACTACS + are all legitimate versions of the TACACS protocol. Therefore, the correct answer is "ALL OF THE ABOVE."
19.
____ generates and issues session keys in Kerberos.
Correct Answer
B. KDC
Explanation
The Key Distribution Center (KDC) generates and issues session keys in Kerberos. The KDC is responsible for authenticating users and providing them with tickets that contain session keys. These session keys are used for secure communication between the client and the server. The KDC plays a crucial role in the Kerberos authentication protocol by ensuring that only authorized users can access resources on the network.
20.
In ____ mode, the data within an IP packet is encrypted, but the header information is not.
Correct Answer
B. Transport
Explanation
In transport mode, the data within an IP packet is encrypted, but the header information is not. This means that only the payload or the actual data is encrypted, while the source and destination IP addresses, as well as other header information, remain visible. Transport mode is commonly used for end-to-end encryption between two hosts, where the data needs to be protected, but the header information still needs to be accessible for routing purposes.