Preview

10 - Internet security - Firewalls

 1. ……………….are a common and easy method of protecting your network and subsequently your system from the risks of using the internet.

  anti hacker walls

  firewalls

  Software hacks

  cartails

 2. Traditionally, users of a network would rely on the security of the individual hosts to protect them but as the number of hosts increases…..

  this became more feasible

  this became less manageable

  this became implemented completely so the internet was secure

  None of the above

 3. Personal firewalls were developed to combat lapses in security and use services to provide the protection

  FALSE

  TRUE

 4. …………..operates at the packet leveland studies each packet as it arrives and passes through the router interfaces.

  Packet-filtering firewalls

  Stateful inspection firewalls

  Filtering protocols

  Proxy servers

 5. ………….are put in place by the network administrator or someone who is overseeing the protection of the network.

  Filtering protocols

  Packet-filtering firewalls

  Proxy servers

  Stateful inspection firewalls

 6. The advantages of a packet filtering firewall include:

  Functionality provided by standard router firmware

  Fast and Flexible

  All of the above

  No user action required for installation

 7. A disadvantage of a packet filtering firewall is that it may not be able to filter source ports and filtering rules are very complex to specify.

  FALSE

  TRUE

 8. The following is a disadvantage of Stateful inspection firewall: cannot be tested for the correctness of the rules and is much less secure than basic packet filtering.

  TRUE

  FALSE

 9. In a stateful inspection firewall the firewalls have no built-in concept of 'state' or 'context' which means the firewall….

  cares about every detail in the packet including what it is for.

  does not care about the packet itself and therefore destroys it

  doesn't care what the packet is for, where it is going or what it does.

  None of the above

 10. The stateful inspection firewall examines every packet….

  against itself and then destroys it if does not match the bit pattern

  None of the above

  against the rule set and prevents any packets from entering or leaving a network if they do not meet the rule's standards

  against a specific number e.g. 423423, and if there is a match, it passes

 11. Stateful insepection firewall involves packet examination that is not resource-intensive at all as hardly any packets come through.

  FALSE

  TRUE

 12. In a stateful inspection firewall, the _____________________are stored in a state table

  states of connections

  network bytes

  cables

  bits

 13. The states that are stored in a table in the stateful inspection firewall are ….

  checked against the WEP key of the firewall

  None of the above

  checked against the states of the allowed policies

  checked against the bit patterns of the CPU

 14. The following is an advantage of what type of firewall/server?
Faster than using a proxy server

  Packet-filtering firewalls

  Filtering protocols

  Proxy servers

  Stateful inspection firewalls

 15. The following is an advantage of what type of firewall/server?
Cheap (in comparison) to set up

  Filtering protocols

  Proxy servers

  Stateful inspection firewalls

  Packet-filtering firewalls

 16. The following is an advantage of what type of firewall/server?
Faster than using a proxy server

  Packet-filtering firewalls

  Stateful inspection firewalls

  All of the above

  Proxy servers

 17. The basic packet filtering firewall is very resource demanding.

  TRUE

  FALSE

 18. A ……………… is often used along with a firewall to increase the security of the system and to reduce bandwidth use.

  internet server

  proxy server

  packet server

  mixed server

 19. Computers inside a network might use a proxy server to access ….

  external information such as webpages and email

  external bandwidth and bit states

  internal information such as the CPU state

  internal connection states

 20. The advantages of a proxy server include:

  All of the above

  Cost effective and protocols can be filtered and manipulated.

  Only one computer is exposed to the outside network (allows exceptions to rules to be fine tuned)

  Only allows proxy services through