ITSY 2430 Intrusion Detection Chapter Quiz 11 Name: __________________

advertisement
Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796
Chapter 11, Page 446
Prof. Michael P. Harris
ITSY 2430 Intrusion Detection
Name: __________________
Chapter Quiz 11
Date: ________
Chapter Review Questions, Strengthening & Managing Firewalls
1. Which of the following guidelines should you keep in mind when editing
your rule base? (Choose all that apply.)
2. One of the simplest and most effective ways to improve a rule base is
to do which of the following?
3. You shouldn’t log events resulting from attempts to access restricted
resources. True or False?
4. The firewall host computer’s ____________ has the most impact on
firewall performance.
5. How can effective firewall administration play a role in disaster
recovery?
6. What is the advantage gained by firewall logs saved in Open Database
Connectivity (ODBC) format?
7. Having several administrators available to configure a firewall can
___________________. (Choose all that apply.)
8. Why do so many firewalls, by default, log packets that are denied?
Page 1 of 3
Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796
Chapter 11, Page 446
Prof. Michael P. Harris
9. If the firewall does not look up hostnames on the host computer, what
happens? (Choose all that apply.)
10. Voice protocols, such as _____________________, are used for Voice
over IP (VoIP) services, in which the IP network also provides telephone
service. (Choose all that apply.)
11. Which program decrypts incoming packets by default?
12. Which of the following is a common formula for determining cache
memory needs?
13. Check Point NG integrates with products that provide antivirus protection
and other functions through the use of _______________.
14. ISA Server 2000 can be installed on which operating systems? (Choose all
that apply.)
15. Iptables built-in chains include _______________. (Choose all that apply.)
16. The default location for Check Point is in the C:\WINNT directory. If
you select another location, you must include which of the following to
point to the location where the product is installed?
Page 2 of 3
Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796
Chapter 11, Page 446
Prof. Michael P. Harris
17. What do Iptables chains consist of?
18. The SmartMap in Check Point NG’s SmartDashboard is which of the
following?
19. To configure Iptables to run whenever you start your computer, which of the
following commands do you use?
20. Which of the following defines your network’s internal addressing
scheme?
Page 3 of 3
Download