Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 10, Page 402 Prof. Michael P. Harris ITSY 2430 Intrusion Detection Name: __________________ Chapter Review Questions, Chapter Quiz 10 Date: ________ Firewall Topology 1. When you request a Web page, the Web server storing the page sends it back to you using which port? 2. Which of the following functions can a bastion host perform? (Choose all that apply.) 3. It doesn’t matter what operating system runs on a bastion host. True or False? 4. A packet filter located between a proxy server and the Internet needs to route traffic to and from which of the following? (Choose all that apply.) 5. Which of the following can hide internal IP addresses from the Internet? (Choose all that apply.) 6. Hardening a bastion host involves which of the following? (Choose all that apply.) 7. Disabling ______________ makes it more difficult for attackers to communicate with internal hosts. 8. Which accounts should you delete on the bastion host? Page 1 of 3 Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 10, Page 402 Prof. Michael P. Harris 9. Goals of proxy servers include which of the following? (Choose all that apply.) 10. What are the advantages of NAT? (Choose all that apply.) 11. Why would you use static NAT mapping rather than hide-mode mapping? (Choose all that apply.) 12. What do proxy servers do that NAT does not do? 13. In which situation should you choose user authentication rather than the more secure client authentication? 14. What kinds of restrictions can you impose on user authentication? (Choose all that apply.) 15. What would an attacker have to do to gain access to an account protected with client authentication? (Choose all that apply.) 16. For session authentication to work with Check Point NG, you need to do which of the following? (Choose all that apply.) 17. Which of the following characteristics describes TACACS+? (Choose all that apply.) Page 2 of 3 Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 10, Page 402 Prof. Michael P. Harris 18. Which elements are used together to create two-factor authentication? (Choose all that apply.) 19. Name three methods that some firewalls use to incorporate encryption and protect users. 20. When you’re stopping or removing services, you should be careful not to disable any _________ services. Page 3 of 3