WS#5solution - WordPress.com

advertisement
Kingdom of Saudi Arabia
Ministry of Higher Education
Princess Noura bint Abdulrahman University
College of Computer & Information Sciences
IS 533
Work Sheet #5
Q1- True or False:
 (ID) can be mapped to more than one entity within the security domain( F ).
one and only one
 Firewall prevent some types of data from passing from untrusted network to
trusted network( T ).
 Firewall appliances are stand-alone( T ). Standalone can also refer to a software
program that does not require any software other than the operating system to run.
 Application Gateways firewall operates at the transport layer. ( F )Circuit
gateway
Q2- Fill in blanks:
 Access control is achieved by means of a combination of policies, programs,
and technologies.
 MAC Stands of Mandatory access controls or Media Access Control
 Typical passphrase might be “ThinkLocallyActGlobally”represented
as…TLAG..
 firewall… builds a bridge between an internal network that is assumed to be
secure and trusted, and another network.
 ..Accountability… ensures that all actions on a system—authorized or
unauthorized—can be attributed to an authenticated identity
TA.Maha Al-kuaib & TA.Hussa Al-omran.
Kingdom of Saudi Arabia
Ministry of Higher Education
Princess Noura bint Abdulrahman University
College of Computer & Information Sciences
IS 533
Q3- Choose the correct answer:
 (Identification- Authentication - Authorization) is the process of validating a
supplicant’s purported identity.
 (Password - Smart Card - Palm Prints )Something a Supplicant Knows and
can recall.
 (1st generation – 3rd generation – 5th generation) kernel proxy, a specialized
form that works under Windows NT Executive
Q4- What are the combination that packet-filtering fire- wall is based on?
1.
2.
3.
4.
IP source and destination address
Direction (inbound or outbound)
Protocol (for firewalls capable of examining the IP protocol layer)
Transmission Control Protocol (TCP) or User Datagram Protocol (UDP)
source and destination port requests.
Q5- What are the four common architectural implementations of firewalls?
A. Packet filtering routers
B. Screened host firewalls
C. Dual-homed host firewalls
D. Screened subnet firewalls
TA.Maha Al-kuaib & TA.Hussa Al-omran.
Download