Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 11, Page 446 Prof. Michael P. Harris ITSY 2430 Intrusion Detection Name: __________________ Chapter Quiz 11 Date: ________ Chapter Review Questions, Strengthening & Managing Firewalls 1. Which of the following guidelines should you keep in mind when editing your rule base? (Choose all that apply.) 2. One of the simplest and most effective ways to improve a rule base is to do which of the following? 3. You shouldn’t log events resulting from attempts to access restricted resources. True or False? 4. The firewall host computer’s ____________ has the most impact on firewall performance. 5. How can effective firewall administration play a role in disaster recovery? 6. What is the advantage gained by firewall logs saved in Open Database Connectivity (ODBC) format? 7. Having several administrators available to configure a firewall can ___________________. (Choose all that apply.) 8. Why do so many firewalls, by default, log packets that are denied? Page 1 of 3 Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 11, Page 446 Prof. Michael P. Harris 9. If the firewall does not look up hostnames on the host computer, what happens? (Choose all that apply.) 10. Voice protocols, such as _____________________, are used for Voice over IP (VoIP) services, in which the IP network also provides telephone service. (Choose all that apply.) 11. Which program decrypts incoming packets by default? 12. Which of the following is a common formula for determining cache memory needs? 13. Check Point NG integrates with products that provide antivirus protection and other functions through the use of _______________. 14. ISA Server 2000 can be installed on which operating systems? (Choose all that apply.) 15. Iptables built-in chains include _______________. (Choose all that apply.) 16. The default location for Check Point is in the C:\WINNT directory. If you select another location, you must include which of the following to point to the location where the product is installed? Page 2 of 3 Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 11, Page 446 Prof. Michael P. Harris 17. What do Iptables chains consist of? 18. The SmartMap in Check Point NG’s SmartDashboard is which of the following? 19. To configure Iptables to run whenever you start your computer, which of the following commands do you use? 20. Which of the following defines your network’s internal addressing scheme? Page 3 of 3