Preview

Network Security

Powerful Essays
Open Document
Open Document
581 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Security
Firewall Quiz
1. A(n) hub____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.
2. A(n) Router____ is a network device that can forward packets across computer networks.
3. A(n) Proxy server____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user.
4. True or False: The DMZ functions as a separate network that rests outside the secure network perimeter. True
5. How is an application layer firewall different from a packet filtering firewall? Why is an application layer firewall sometimes called a proxy server? Packet filtering firewalls examine header information of data packets and they enforce rules designed to prohibit packets with certain addresses or partial addresses. Application layer firewall
6. How is static filtering different from dynamic filtering of packets? Which is perceived to offer improved security?
7. What is stateful inspection? How is state information maintained during a network connection or transaction?
8. What is a circuit gateway, and how does it differ from the other forms of firewalls?
9. What special function does a cache server perform? Why is this useful for larger organizations?
10. Describe how the various types of firewalls interact with the network traffic at various levels of the OSI model.
11. What is a hybrid firewall?
12. List the five generations of firewall technology. Which generations are still in common use?
13. How does a commercial-grade firewall appliance differ from a commercial-grade firewall system? Why is this difference significant?
14. Explain the basic technology that makes residential/SOHO firewall appliances effective in protecting a local network. Why is this usually adequate for protection?
15. What key features point to the superiority of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    JG NT2640

    • 333 Words
    • 1 Page

    A. Hubs create a single electrical bus to which all devices connect, causing the de- vices to share the bandwidth.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ITNW 2335

    • 402 Words
    • 2 Pages

    6. What are three main types of high-bandwidth connection options used by medium- to large-sized businesses?…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100)…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    A(n) ____ is a hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    ISSC 340

    • 275 Words
    • 2 Pages

    Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100)…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lesson10

    • 285 Words
    • 2 Pages

    Connection security rules require that network traffic allowed through the firewall use which of the following security mechanism?…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    A proxy service is an application that acts as an intermediary between systems. Information from the internet is received by the firewall and sent to the requesting system and vice versa.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    5. What is the difference between a traditional IP Stateful Firewall and a Deep Packet Inspection Firewall?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays