ITSY 2430 Intrusion Detection Chapter Quiz 10 Name: __________________

advertisement
Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796
Chapter 10, Page 402
Prof. Michael P. Harris
ITSY 2430 Intrusion Detection
Name: __________________
Chapter Review Questions,
Chapter Quiz 10
Date: ________
Firewall Topology
1. When you request a Web page, the Web server storing the page sends it
back to you using which port?
2. Which of the following functions can a bastion host perform? (Choose all
that apply.)
3. It doesn’t matter what operating system runs on a bastion host. True or
False?
4. A packet filter located between a proxy server and the Internet needs to
route traffic to and from which of the following? (Choose all that apply.)
5. Which of the following can hide internal IP addresses from the Internet?
(Choose all that apply.)
6. Hardening a bastion host involves which of the following? (Choose all that
apply.)
7. Disabling ______________ makes it more difficult for attackers to
communicate with internal hosts.
8. Which accounts should you delete on the bastion host?
Page 1 of 3
Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796
Chapter 10, Page 402
Prof. Michael P. Harris
9. Goals of proxy servers include which of the following? (Choose all that
apply.)
10. What are the advantages of NAT? (Choose all that apply.)
11. Why would you use static NAT mapping rather than hide-mode mapping?
(Choose all that apply.)
12. What do proxy servers do that NAT does not do?
13. In which situation should you choose user authentication rather than the
more secure client authentication?
14. What kinds of restrictions can you impose on user authentication? (Choose
all that apply.)
15. What would an attacker have to do to gain access to an account protected
with client authentication? (Choose all that apply.)
16. For session authentication to work with Check Point NG, you need to do
which of the following? (Choose all that apply.)
17. Which of the following characteristics describes TACACS+? (Choose all that
apply.)
Page 2 of 3
Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796
Chapter 10, Page 402
Prof. Michael P. Harris
18. Which elements are used together to create two-factor authentication?
(Choose all that apply.)
19. Name three methods that some firewalls use to incorporate encryption
and protect users.
20. When you’re stopping or removing services, you should be careful not to
disable any _________ services.
Page 3 of 3
Download