Preview

10 - Internet security - Firewalls

 1. ……………….are a common and easy method of protecting your network and subsequently your system from the risks of using the internet.

  anti hacker walls

  cartails

  firewalls

  Software hacks

 2. Traditionally, users of a network would rely on the security of the individual hosts to protect them but as the number of hosts increases…..

  this became less manageable

  this became implemented completely so the internet was secure

  None of the above

  this became more feasible

 3. Personal firewalls were developed to combat lapses in security and use services to provide the protection

  FALSE

  TRUE

 4. …………..operates at the packet leveland studies each packet as it arrives and passes through the router interfaces.

  Filtering protocols

  Packet-filtering firewalls

  Proxy servers

  Stateful inspection firewalls

 5. ………….are put in place by the network administrator or someone who is overseeing the protection of the network.

  Filtering protocols

  Stateful inspection firewalls

  Proxy servers

  Packet-filtering firewalls

 6. The advantages of a packet filtering firewall include:

  All of the above

  No user action required for installation

  Functionality provided by standard router firmware

  Fast and Flexible

 7. A disadvantage of a packet filtering firewall is that it may not be able to filter source ports and filtering rules are very complex to specify.

  TRUE

  FALSE

 8. The following is a disadvantage of Stateful inspection firewall: cannot be tested for the correctness of the rules and is much less secure than basic packet filtering.

  FALSE

  TRUE

 9. In a stateful inspection firewall the firewalls have no built-in concept of 'state' or 'context' which means the firewall….

  cares about every detail in the packet including what it is for.

  does not care about the packet itself and therefore destroys it

  None of the above

  doesn't care what the packet is for, where it is going or what it does.

 10. The stateful inspection firewall examines every packet….

  against itself and then destroys it if does not match the bit pattern

  against the rule set and prevents any packets from entering or leaving a network if they do not meet the rule's standards

  None of the above

  against a specific number e.g. 423423, and if there is a match, it passes

 11. Stateful insepection firewall involves packet examination that is not resource-intensive at all as hardly any packets come through.

  FALSE

  TRUE

 12. In a stateful inspection firewall, the _____________________are stored in a state table

  bits

  states of connections

  cables

  network bytes

 13. The states that are stored in a table in the stateful inspection firewall are ….

  checked against the states of the allowed policies

  checked against the bit patterns of the CPU

  None of the above

  checked against the WEP key of the firewall

 14. The following is an advantage of what type of firewall/server?
Faster than using a proxy server

  Stateful inspection firewalls

  Proxy servers

  Packet-filtering firewalls

  Filtering protocols

 15. The following is an advantage of what type of firewall/server?
Cheap (in comparison) to set up

  Filtering protocols

  Stateful inspection firewalls

  Packet-filtering firewalls

  Proxy servers

 16. The following is an advantage of what type of firewall/server?
Faster than using a proxy server

  Stateful inspection firewalls

  Packet-filtering firewalls

  All of the above

  Proxy servers

 17. The basic packet filtering firewall is very resource demanding.

  FALSE

  TRUE

 18. A ……………… is often used along with a firewall to increase the security of the system and to reduce bandwidth use.

  mixed server

  proxy server

  internet server

  packet server

 19. Computers inside a network might use a proxy server to access ….

  internal information such as the CPU state

  internal connection states

  external bandwidth and bit states

  external information such as webpages and email

 20. The advantages of a proxy server include:

  Only one computer is exposed to the outside network (allows exceptions to rules to be fine tuned)

  All of the above

  Only allows proxy services through

  Cost effective and protocols can be filtered and manipulated.