Preview

10 - Internet security - Firewalls

 1. ……………….are a common and easy method of protecting your network and subsequently your system from the risks of using the internet.

  firewalls

  Software hacks

  anti hacker walls

  cartails

 2. Traditionally, users of a network would rely on the security of the individual hosts to protect them but as the number of hosts increases…..

  this became implemented completely so the internet was secure

  None of the above

  this became more feasible

  this became less manageable

 3. Personal firewalls were developed to combat lapses in security and use services to provide the protection

  FALSE

  TRUE

 4. …………..operates at the packet leveland studies each packet as it arrives and passes through the router interfaces.

  Proxy servers

  Packet-filtering firewalls

  Stateful inspection firewalls

  Filtering protocols

 5. ………….are put in place by the network administrator or someone who is overseeing the protection of the network.

  Stateful inspection firewalls

  Packet-filtering firewalls

  Proxy servers

  Filtering protocols

 6. The advantages of a packet filtering firewall include:

  All of the above

  Fast and Flexible

  No user action required for installation

  Functionality provided by standard router firmware

 7. A disadvantage of a packet filtering firewall is that it may not be able to filter source ports and filtering rules are very complex to specify.

  FALSE

  TRUE

 8. The following is a disadvantage of Stateful inspection firewall: cannot be tested for the correctness of the rules and is much less secure than basic packet filtering.

  TRUE

  FALSE

 9. In a stateful inspection firewall the firewalls have no built-in concept of 'state' or 'context' which means the firewall….

  cares about every detail in the packet including what it is for.

  None of the above

  does not care about the packet itself and therefore destroys it

  doesn't care what the packet is for, where it is going or what it does.

 10. The stateful inspection firewall examines every packet….

  None of the above

  against itself and then destroys it if does not match the bit pattern

  against a specific number e.g. 423423, and if there is a match, it passes

  against the rule set and prevents any packets from entering or leaving a network if they do not meet the rule's standards

 11. Stateful insepection firewall involves packet examination that is not resource-intensive at all as hardly any packets come through.

  FALSE

  TRUE

 12. In a stateful inspection firewall, the _____________________are stored in a state table

  bits

  states of connections

  network bytes

  cables

 13. The states that are stored in a table in the stateful inspection firewall are ….

  checked against the WEP key of the firewall

  None of the above

  checked against the bit patterns of the CPU

  checked against the states of the allowed policies

 14. The following is an advantage of what type of firewall/server?
Faster than using a proxy server

  Stateful inspection firewalls

  Packet-filtering firewalls

  Filtering protocols

  Proxy servers

 15. The following is an advantage of what type of firewall/server?
Cheap (in comparison) to set up

  Filtering protocols

  Proxy servers

  Stateful inspection firewalls

  Packet-filtering firewalls

 16. The following is an advantage of what type of firewall/server?
Faster than using a proxy server

  Packet-filtering firewalls

  Proxy servers

  All of the above

  Stateful inspection firewalls

 17. The basic packet filtering firewall is very resource demanding.

  TRUE

  FALSE

 18. A ……………… is often used along with a firewall to increase the security of the system and to reduce bandwidth use.

  internet server

  mixed server

  packet server

  proxy server

 19. Computers inside a network might use a proxy server to access ….

  internal information such as the CPU state

  internal connection states

  external information such as webpages and email

  external bandwidth and bit states

 20. The advantages of a proxy server include:

  All of the above

  Only allows proxy services through

  Only one computer is exposed to the outside network (allows exceptions to rules to be fine tuned)

  Cost effective and protocols can be filtered and manipulated.