Guide to Firewalls and Network Security Chapter 10 Solutions Review Questions 1. The best firewall is… Answer: D 2. Firwalls are classified as either enterprise or… Answer: A 3. An unauthorized access is point is called a(n)… Answer: B 4. The ICSA is an independent group that tests and certifies… Answer: D 5. A program that pretends to be a regular and known program but it has malicious intent is know as a(n)… Answer: A 6. An MD5 signature is also know as a(n)… Answer: B 7. The technology that creates a closed environment around an application and restricts its access to resources is known as… Answer: D 8. Each of the following is an example of active content except… Answer: D 9. Each of the following is a Tiny Personal Firewall sandbox object except… Answer: A 10. Changes to a parent group using Sygate Management Server (SMS) results in those same changes being inherited by all… Answer: B 11. The most flexible firewalls restrict packets based on either TCP port or… Answer: D 12. A ____________________ system creates and checks the signatures of application programs. Answer: C 13. ZoneAlarm’s Internet Lock blocks all Internet traffic while the computer is… Answer: B 14. The maximum number of devices that a single Linksys firewall/router can protect is… Answer: C 15. Another name for a Web address is… Answer: A 16. Sending a single data transmission to multiple recepients simultaneously is know as… Answer: D Guide to Firewalls and Network Security Chapter 10 Solutions 17. The firewall Internet Security and Acceleration (ISA) Server 2000 was developed by… Answer: B 18. A server that has more than one network connection is know as a(n)… Answer: A 19. Each of the following is an Internet Security and Acceleration (ISA) rule for processing incoming requests except… Answer: D 20. Quality of Service (QoS) can be used to control the amount of ____________________ available to a particular application or to a group of users. Answer: D Guide to Firewalls and Network Security Chapter 10 Solutions