Study sets, textbooks, questions
Upgrade to remove ads
CIST 1401 Section 8.1-8.3 PQ
Terms in this set (30)
Which of the following is a firewall function?
You would like to control internet access based on users, time of day, and websites visited. How can you do this?
Install a proxy server. Allow internet access only through the proxy server.
Which of the following are true of a circuit proxy filter firewall? (Select two.)
Operates at the Session layer.
Verifies sequencing of session packets.
Which of the following are true about reverse proxy? (Select two.)
Can perform load balancing, authentication, and caching.
Handles requests from the internet to a server in a private network.
You have a router that is configured as a firewall. The router is a Layer 3 device only.
Which of the following does the router use for identifying allowed or denied packets?
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling.
You want to protect the laptop from internet-based attacks.
Which solution should you use?
Which of the following are characteristics of a circuit-level gateway? (Select two.)
Filters by session
You connect your computer to a wireless network available at the local library. You find that you can access all the websites you want on the internet except for two.
What might be causing the problem?
A proxy server is blocking access to the websites.
You have just installed a packet filtering firewall on your network.
Which options will you be able to set on your firewall? (Select all that apply.)
Source address of a packet
Destination address of a packet
Haley configures a website using Windows Server 2016 default values.
What are the HTTP port and SSL port settings?
80 for HTTP; 443 for SSL
You have recently installed a new Windows Server 2016 system. To ensure the accuracy of the system time, you have loaded an application that synchronizes the hardware clock on the server with an external time source on the internet. Now, you must configure the firewall on your network to allow time synchronization traffic through.
Which of the following ports are you most likely to open on the firewall?
You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open TCP/IP ports 80, 25, 110, and 143.
Assuming that no other ports on the firewall need to be configured to provide access, which applications are most likely to be hosted on the server?
Web server and email server
You are monitoring network traffic on your network, and you see traffic between two network hosts on port 2427.
Which kind of network traffic uses this port?
The MGCP protocol is generating traffic, which VoIP uses to send voice data over a network.
You are monitoring network traffic on your network, and you see traffic between two network hosts on port 1720.
What is the source of this network traffic?
Someone is using voice over IP (VoIP) to make a telephone call.
An all-in-one security appliance is best suited for which type of implementation?
A remote office with no on-site technician.
Which of the following features are common functions of an all-in-one security appliance? (Select two.)
You recently installed a new all-in-one security appliance in a remote office. You are in the process of configuring the device. You need to:
Increase the security of the device.
Enable remote management from the main office.
Allow users to be managed through Active Directory.
You want to configure the device so you can access it from the main office. You also want to make sure the device is as secure as possible.
Which of the following tasks should you carry out? (Select two.)
Configure the device's authentication type to use Active Directory.
Change the default username and password.
Your company has a connection to the internet that allows users to access the internet. You also have a web server and an email server that you want to make available to internet users. You want to create a DMZ for these two servers.
Which type of device should you use to create the DMZ?
You have used firewalls to create a demilitarized zone. You have a web server that needs to be accessible to internet users. The web server must communicate with a database server for retrieving product, customer, and order information.
How should you place devices on the network to best protect the servers? (Select two.)
Put the database server on the private network.
Put the web server inside the DMZ.
You have a router that is configured as a firewall. The router is a Layer 3 device only. Which of the following does the router use for identifying allowed or denied packets?
You have just installed a packet filtering firewall on your network. Which options will you be able to set on your firewall? (Select all that apply.)
Source address of a packet
Destination address of a packet
Which of the following describes how access lists can be used to improve network security?
An access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers.
Which of the following is likely to be located in a DMZ?
In which of the following situations would you most likely implement a demilitarized zone (DMZ)?
You want to protect a public web server from attack.
When designing a firewall, what is the recommended approach for opening and closing ports?
Close all ports; open only ports required by applications inside the DMZ.
After blocking a number of ports to secure your server, you are unable to send email. To allow email service, which of the following needs to be done?
Open port 25 to allow SMTP service.
You administer a web server on your network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.23.17. The name of the computer is www.westsim.com. You configured the website as follows:
IP address: 192.168.23.8
HTTP Port: 1030
SSL Port: 443
Users complain that they can't connect to the website when they type www.westsim.com. What is the most likely source of the problem?
The HTTP port should be changed to 80.
You want to maintain tight security on your internal network, so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable?
In the output of the netstat command, you notice that a remote system has made a connection to your Windows Server 2016 system using TCP/IP port 21.
Which of the following actions is the remote system most likely performing?
Downloading a file
You want to allow users to download files from a server running the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server.
Which TCP/IP protocol should you implement to provide this capability?
Sets found in the same folder
CIST 1401 Section 1.1 - 1.5 PQ
CIST 1401 Section 2.1-2.5 PQ
CIST 1401 Section 3.1-3.3 PQ
CIST 1401 Section 4.1-4.4 PQ
Other sets by this creator
CIST Section 10.1 - 10.7 PQ
CIST 1401 Section 9.1-9.5 PQ
CIST 1401 Section 7.1-7.4 PQ
CIST 1401 Section 6.1-6.7 PQ
Other Quizlet sets
Real Estate Math
ABLS (Burn Medicine)
HESI Case Study - Gonorrhea
patho exam 3 EAQs chapter 29