Anda di halaman 1dari 9

Objective Questions:-

1.

A firewall needs to be ____ so that it can grow with the network it protects.

A. B. C. D.

robust expensive fast scalable

2.

A(n) ____ is a fancy term for a computer that has two network interfaces.

A. B. C. D.

proxy gateway duel-homed host routing workstation NAT server

3.

A(n) ____ host is sometimes called a dual-homed gateway or bastion host.

A. B. C. D.

proxy stub sceened blocked

4.

The ____ server in the DMZ needs only list a limited number of public IP addresses.

A. B. C. D.

DNS NAT proxy firewall

5.

A(n) ____ server is a server that creates a secure tunnel connection.

A. B. C. D.

RADIUS VPN tunnel authentication

6.

What is one advantage of setting up a DMZ with two firewalls?

A. B. C. D.

You can control where traffic goes in the three networks You can do stateful packet filtering You can do load balancing Improved network performance

7. The use of the Internet or other electronic means to stalk or harass an invidual, a group of individuals, or an organisation is termed: (a)Cyberspace (b)Cyberstalking (c)Pornography (d)None of these

8. A system that monitors traffic into and out of a network and automatically alerts personnel when suspicious traffic patterns occur, indicating a possible

unauthorized intrusion attempt is called a(n) __________________.

A. B. C. D.

IDS firewall router anit-virus software

9. In an IP packet header, the ____ is the address of the computer or device that is to receive the packet.

A. B. C. D.

source address flag destination address total length

10. In an IP packet header, the ____ describes the length of the header in 32-bit words and is a 4-bit value.

A. B. C. D.

Internet header length fragment offset total length header checksum

11.

What tells a firewall how to reassemble a data stream that has been divided into packets?

A. B. C. D.

The source routing feature The number in the header's identification field The destination IP address The header checksum field in the packet header

12.

What is the most effective security approach for a stateless packet filter?

A. B. C. D.

Deny all except specified hosts Allow all except specified hosts Allow access to only specified destination servers Deny access to all destinations except specified servers

13.

What TCP port is used by Telnet?

A. B. C. D.

80 110 23 72

14.

What TCP port is used to filter out Web traffic?

A.

25

B. C. D.

21 23 80

15. Some ____ firewalls are able to examine the contents of packets as well as the headers for signs that they are legitimate.

A. B. C. D.

boundary stateful stateless personal

16.

What is the most common command to use ICMP?

A. B. C. D.

Ping Trace Netstat NBTstat

17.

What port does secure HTTP use?

A. B. C. D.

8080 224 442 443

18.

What port does DNS use for connection attempts?

A. B. C. D.

68 21 53 56

19.

FTP uses port ____ for the control port.

A. B. C. D.

20 21 22 23

20.

A datagram is called ______ at the physcial layer of OSI.

A. B. C. D.

bits segments frames packets

21.

A datagram is called ______ at the network layer of OSI.

A. B.

bits segments

C. D.

frames packets

22.

Which of the following is a cyber crime?

(a)Hacking (b)Worm attack (c)Virus attack (d)All of these

23.

A ________-level proxy provides protection at the session layer of OSI.

A. B. C. D.

application circuit proxy server

24.

Ports up to _______ are called well-known ports.

A. B. C. D.

1500 255 1023 1025

25.

A stateful firewall maintains a ___________, which is a list of active connections.

A. B. C. D.

routing table bridging table state table connection table

26. _______________ is an error-checking procedure performed in the trailer section of an IP packet.

A. B. C. D.

CRC ACK FQDN FIN

27. This 8-bit value identifies the maximum time the packet can remain in the system before it is dropped.

A. B. C. D.

fragment time to live protocol checksum

28.

Zone Alarm is an example of a ________ firewall.

A. B.

personal corporate

C. D.

IDS none of the above

29.

___________ is another term for a packet of digital information.

A. B. C. D.

footer header data datagram

30. The practice of designing operational aspects of a system to work with a minimal amount of system privilege is called _____________.

A. B. C. D.

least privilege failover firewall IP forwarding access denied

Anda mungkin juga menyukai