System Administration Chapter 10 Quiz 1. A screened host uses a _________________ firewall setup. a. switch b. router c. bastion d. proxy 2. Which of the following is not a risk to a network? a. users b. viruses c. hackers d. printers 3. What element of a firewall allows an administrator to control what packets enter the network and what packets are prohibited? a. access control list b. access monitoring list c. access prevention list d. access detention list 4. A system of hardware and/or software that blocks or permits designated types of traffic between networks is a(n) a. router. b. operating system. c. translator. d. firewall. 5. Which of the following is a risk that firewalls and proxy servers cannot protect against? a. viruses b. hackers c. accessible holes in the network’s protection system d. unwanted traffic 6. The proxy firewall functions at the _________________ layer of the OSI Model. a. Transport b. Session c. Network d. Application 7. The term best suited to describe the function of a proxy service is a. host. b. translator. c. grader. d. gateway. 8. Which one of the following is neither part of the internal network nor part of the external network? a. router b. DMZ c. ACL d. server 9. What is a natural consequence to the network when a proxy service is installed? a. acceleration in network performance b. limited access to network services c. degradation in network performance d. expanded access to network services 10. When the risk assessment is done on a network prior to installing a security boundary, what element listed below is not considered a risk in that assessment? a. the users b. hackers c. bastion hosts d. business value