Preview

10 - Internet security - Firewalls

 1. ……………….are a common and easy method of protecting your network and subsequently your system from the risks of using the internet.

  cartails

  Software hacks

  anti hacker walls

  firewalls

 2. Traditionally, users of a network would rely on the security of the individual hosts to protect them but as the number of hosts increases…..

  None of the above

  this became implemented completely so the internet was secure

  this became less manageable

  this became more feasible

 3. Personal firewalls were developed to combat lapses in security and use services to provide the protection

  FALSE

  TRUE

 4. …………..operates at the packet leveland studies each packet as it arrives and passes through the router interfaces.

  Filtering protocols

  Proxy servers

  Packet-filtering firewalls

  Stateful inspection firewalls

 5. ………….are put in place by the network administrator or someone who is overseeing the protection of the network.

  Stateful inspection firewalls

  Packet-filtering firewalls

  Filtering protocols

  Proxy servers

 6. The advantages of a packet filtering firewall include:

  Functionality provided by standard router firmware

  No user action required for installation

  All of the above

  Fast and Flexible

 7. A disadvantage of a packet filtering firewall is that it may not be able to filter source ports and filtering rules are very complex to specify.

  TRUE

  FALSE

 8. The following is a disadvantage of Stateful inspection firewall: cannot be tested for the correctness of the rules and is much less secure than basic packet filtering.

  FALSE

  TRUE

 9. In a stateful inspection firewall the firewalls have no built-in concept of 'state' or 'context' which means the firewall….

  does not care about the packet itself and therefore destroys it

  cares about every detail in the packet including what it is for.

  None of the above

  doesn't care what the packet is for, where it is going or what it does.

 10. The stateful inspection firewall examines every packet….

  against itself and then destroys it if does not match the bit pattern

  against a specific number e.g. 423423, and if there is a match, it passes

  against the rule set and prevents any packets from entering or leaving a network if they do not meet the rule's standards

  None of the above

 11. Stateful insepection firewall involves packet examination that is not resource-intensive at all as hardly any packets come through.

  TRUE

  FALSE

 12. In a stateful inspection firewall, the _____________________are stored in a state table

  bits

  states of connections

  network bytes

  cables

 13. The states that are stored in a table in the stateful inspection firewall are ….

  None of the above

  checked against the bit patterns of the CPU

  checked against the WEP key of the firewall

  checked against the states of the allowed policies

 14. The following is an advantage of what type of firewall/server?
Faster than using a proxy server

  Proxy servers

  Filtering protocols

  Packet-filtering firewalls

  Stateful inspection firewalls

 15. The following is an advantage of what type of firewall/server?
Cheap (in comparison) to set up

  Packet-filtering firewalls

  Proxy servers

  Filtering protocols

  Stateful inspection firewalls

 16. The following is an advantage of what type of firewall/server?
Faster than using a proxy server

  Proxy servers

  All of the above

  Packet-filtering firewalls

  Stateful inspection firewalls

 17. The basic packet filtering firewall is very resource demanding.

  TRUE

  FALSE

 18. A ……………… is often used along with a firewall to increase the security of the system and to reduce bandwidth use.

  proxy server

  packet server

  internet server

  mixed server

 19. Computers inside a network might use a proxy server to access ….

  external information such as webpages and email

  internal connection states

  internal information such as the CPU state

  external bandwidth and bit states

 20. The advantages of a proxy server include:

  Cost effective and protocols can be filtered and manipulated.

  All of the above

  Only one computer is exposed to the outside network (allows exceptions to rules to be fine tuned)

  Only allows proxy services through