Kingdom of Saudi Arabia Ministry of Higher Education Princess Noura bint Abdulrahman University College of Computer & Information Sciences IS 533 Work Sheet #5 Q1- True or False: (ID) can be mapped to more than one entity within the security domain( F ). one and only one Firewall prevent some types of data from passing from untrusted network to trusted network( T ). Firewall appliances are stand-alone( T ). Standalone can also refer to a software program that does not require any software other than the operating system to run. Application Gateways firewall operates at the transport layer. ( F )Circuit gateway Q2- Fill in blanks: Access control is achieved by means of a combination of policies, programs, and technologies. MAC Stands of Mandatory access controls or Media Access Control Typical passphrase might be “ThinkLocallyActGlobally”represented as…TLAG.. firewall… builds a bridge between an internal network that is assumed to be secure and trusted, and another network. ..Accountability… ensures that all actions on a system—authorized or unauthorized—can be attributed to an authenticated identity TA.Maha Al-kuaib & TA.Hussa Al-omran. Kingdom of Saudi Arabia Ministry of Higher Education Princess Noura bint Abdulrahman University College of Computer & Information Sciences IS 533 Q3- Choose the correct answer: (Identification- Authentication - Authorization) is the process of validating a supplicant’s purported identity. (Password - Smart Card - Palm Prints )Something a Supplicant Knows and can recall. (1st generation – 3rd generation – 5th generation) kernel proxy, a specialized form that works under Windows NT Executive Q4- What are the combination that packet-filtering fire- wall is based on? 1. 2. 3. 4. IP source and destination address Direction (inbound or outbound) Protocol (for firewalls capable of examining the IP protocol layer) Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) source and destination port requests. Q5- What are the four common architectural implementations of firewalls? A. Packet filtering routers B. Screened host firewalls C. Dual-homed host firewalls D. Screened subnet firewalls TA.Maha Al-kuaib & TA.Hussa Al-omran.