Elance Firewall Concepts Test Answers 2015



What firewall based technology would you use to create a secure tunnel connection from a corporate headquarters to a remote branch office?
VPN
Tunnel
HTTPS
Radius


When configuring a firewall to deny port 3389 to a RDP server that is to receive the SYN packet, what is the address?
Flag
Destination
Source
Connected


Which of the folllowing firewalls keeps track of the state of network connections ?
Static filtering
Stateless inspection
Stateful inspection
Dynamic Filtering


What is a DMZ zone?
Dual Master Zone
DeMilitarized Zone
Donor Master Zone
Dedicated Master Zone


Your client asks you to create a rule for FTP access, what port(s) will you add on the firewall?
20 and 21
20
8021
2121


Which of the following 8-bit values identifies the maximum time the packet can remain in the system before it is dropped?
fragment
time to live
checksum
protocol


Which TCP port is used by Telnet?
110
80
23
72


What is the primary purpose of a firewall?
Enables fast forwarding
Route frames
Route hot packets
Inspect packets


Which of the following server creates a secure tunnel connection?
RADIUS
tunnel
authentication
VPN


Your customer asks you to allow ALL hosts from the Internet to company's secure webserver (Secure HTTP), what port do you open on the firewall?
23
22
443
43


FTP uses which of the following port as control port?
21
22
20
23


Which of the following is not a recognized generation of Firewall?
First Generation
Third Generation
DMZ
Second generation


What device logically filters traffic at the edge of a computer network and the Internet?
Switch
Firewall
Router
Hub


Which of the following is TRUE?
The firewall may be a separate computer system, a software service running on an existing router or server, or a separate network containing a number of supporting devices
All of the given options are correct
Firewalls can be categorized by processing mode, development era, or structure
Firewalls categorized by which level of technology they employ are identified by generation, with the later generations being more complex and more recently developed


You want to filter all traffic going to an internal web server from the Internet side of the firewall, what port will you filter on the firewall?
8080
80
21
25


In an IP packet header, which of the following is the address of the computer or device that is to receive the packet?
total length
source address
flag
destination address


What port does FTP use for the control port?
20
23
21
22


Which of the following firewalls works at the application level?
Packet filtering firewal
application-level firewalls
circuit firewall
MAC layer firewalls


Which port does secure HTTP use?
442
8080
443
441


What application controls what information is transmitted or received from an external source destined to a server, workstation, or computer that is based on a preset of rules and/or user preferences?
Server
Repeater
Router
Firewall


Some firewalls deploy a technology that allows monitoring of traffic in and out of a network and alerts network staff when suspicious traffic patterns occur.
Router
IDS
Hub
Switch


Which of the following firewalls keeps track of the connection state?
Packet filtering firewall
Stateful packet filtering firewall
Application layer firewall
Router enhanced firewall


You are a network administrator and you have been asked to add a deny all ICMP firewall stated that is sourced from the Internet; you add a deny all for ICMP, what common command would you use to test your newly added rule?
Traceroute
ICMP
PING
MTR


What is a host based firewall?
Software firewall installed on a server/workstation/desktop
A proxy server configured to handle http requests
A device that is installed by your Internet Service Provider
A Firewall connected directly to the Network Interface Card of a Computer


When referring to firewall concepts, what are application level gateways?
HTTP servers
Proxy servers
IP Servers
HTTP servers


Packets contain an 8-bit value that determines the maximum time the packet can remain the CPU, Memory, and Buffer circuits of a firewall before it is dropped or discarded, what is this called?
Protocol
Time To Live
Fragment
Checksum


When designing a network that consists of a firewall, the firewall design needs to be "BLANK" so that it can grow with the network it protects.
Cost effective
Robust
Scalable
Expensive


The Windows based program, ZoneAlarm is an example of a "BLANK" firewall?
Software
Business
Corporate
IDS


What types of firewalls are able to analyze the contents of packets and the IP headers for signs that the traffic is legitimate?
Stateless
Software
Boundary
Stateful


Which of the following is another term for a packet of digital information?
header
data
datagram
footer


Which of the following is not a VALID basic criteria for rule in the firewall policy?
Destination
User
Service
Source


Which of the following valid OSI layer are covered by packet filtering firewall operation ?
Network layer
Transport layer
At the Application layer
Both Transport layer and Network layer


The practice of designing operational aspects of a system to work with a minimal amount of system privilege is called:
IP forwarding
least privilege
access denied
failover firewall


When referring to firewalls, what does SPI Stand for?
Stateless Packet Inspection
Shared Packet Interconnection
Stateful Packet Inspection
Source Packet Information


Ports up to which of the following are called well-known ports?
1025
255
1023
1500


Which particular firewall usually consists of two separate firewall devices?
Application –level firewall
MAC layer firewalls
Hybrid Firewall
Dynamic Filtering


What main attributes are used at layer 4 of the OSI model to filter traffic on a firewall?
Frames and packets
Source and/or destination IP Addresses
Source and/or destination TCP/UDP ports
ICMP and IP


When packets are being processed by a hardware firewall, one of the several steps in processing the packets is an error-checking procedure that is performed in the trailer section of an IP Packet, this is called what?
IFG
IPC (IP Check)
CRC
FQDN


Which type of firewall involves firewall software installation directly on the user's system?
Third Generation
Residential –Grade Firewall
Commercial –Grade Firewall
Fourth Generation


Which of the following are the most common restrictions implemented in packet filtering firewalls?
All of the given options are valid
IP source and destination address
Inbound Direction
Outbound Direction


When troubleshooting the flow of packets through a firewall, a datagram is called what at the network layer of the OSI model?
Frames
Packets
Segments
Bits


What port do most DDOS DNS attacks occur on?
161
80
53
443


Which of the following firewall makes the filtering decision based on the media access control address of the source/destination of a packet ?
MAC layer Firewalls
Packet Filtering
Circuit Gateways
Application Gateways


Zone Alarm is an example of which type of firewall?
proxy
IDS
corporate
personal


The basic concept of a SYN flooding attack lies in the design of what handshake that begins a TCP connection?
4-way
2-way
TCP
3-way


What it is called when a packet arrives at a firewall, gets analyzed and determines that no connection exists and the packet is dropped?
Stateful Packet Inspection
Connection Oriented Inspection
Stateless Packet Inspection
Stateful Frame Inspection


A stateful firewall maintains which of the following?
bridging table
connection table
routing table
state table


What happens when a packet arrives on an interface and a route exists in the local routing table and the firewall routes the packet back out the same interface the packet arrived on?
Interface will get disabled due to a routing conflict
The Packet is allowed, but marked as low priority
The Packet is dropped
Poison reverse routing is disabled and the packet is allowed


What specific chip design allows firewalls to accelerate packet processing to analyze and filter packets between an untrusted and trusted network?
MIPS
Intel X86
RISC
ASIC


What technology is used on firewalls that process stateful packet inspections at the hardware level and as close to the line rate as possible?
ACL
ASIC
Intel
SPI


True/False: Application proxy firewalls are faster than Stateful Packet Inspection firewalls.
False
True


Which of the following firewall's filtering process can be either Stateful, Stateless or both ?
Circuit Gateways
Application Gateways
Packet Filtering
MAC layer firewalls


What device should be the front line defense in your network?
Network Layer Firewalls
Application Based Firewalls
Packet Filtering Firewalls
Stateful Packet Inspection firewall


What kind of firewall is the opensource IPtables firewall commonly found on Linux Distros?
Connection oriented firewall
Stateful
Zone Based
Stateless


Which particular generation firewall are stateless in nature ?
Second generation
Third Generation
Fourth Generation
First Generation


A Stateful Packet Inspection firewall maintains a "BLANK", which is also just a list of active connections.
NAT Table
Routing Table
Connection Table
State Table


Ports up to "BLANK" are considered well known ports.
65536
1024
1023
65524


True/False: NAT is considered as a firewall technology.
True
False


What kind of firewall is the integrated Microsoft Windows firewall application?
Stateful
Stateless
Zone Based
Connection oriented firewall


A "BLANK" flowing through a firewall is another term for a packet of digital information.
Frame
Datagram
Data
Packet


Network-based firewalls and Host-based firewalls are valid categories of which of the following firewall ?
Circuit Gateways
Hybrids
Application –level firewall
MAC layer firewalls


What do circuit layer Firewalls monitor?
Transport Handshaking
TCP Handshaking
IP Handshaking
UDP Handshaking


Which of the following is not a VALID subset of packet filtering firewalls?
Stateless inspection
Dynamic Filtering
Stateful inspection
Static filtering


A dynamic or Stateful Packet Inspection firewall maintains active "BLANK" sessions and "BLANK" pseudo sessions.
Server and Host
Stateful and Stateless
TCP and UDP
IP and ICMP


Which of the following is not a VALID processing –mode category of firewalls?
Proxy firewalls
Circuit gateways
Packet filtering Firewalls
Application gateways


What is a Cisco Access Control List (ACL) considered as?
Controlled
Stateful
Stateless
NAT


Which of the following is a mechanism designed into operating system kernel ?
Second generation
Third Generation
Fifth Generation
First Generation


Which of the following servers in the DMZ needs only list a limited number of public IP addresses?
DNS
NAT
proxy
firewall


Which of the following is FALSE about Circuit Gateways?
Circuit Gateway firewalls provide a common access mechanism which is not dependent on the destination application
Circuit Gateway firewalls provide a unique access mechanism based on the destination application
Circuit gateways firewalls DO NOT look at data traffic flowing between one network and another
Firewall operates at the transport layer


Which generation firewalls are stateful inspection firewalls?
Second generation
First Generation
Fourth Generation
Third Generation


In an IP packet header, which of the following describes the length of the header in 32-bit words and is a 4-bit value?
total length
fragment offset
header checksum
Internet header length


Which of the following can have different components of the firewall for different systems?
dual-homed firewalls
packet filtering routers
screened subnet firewall
Screened Host Firewalls


What layer(s) does an SPI firewall generally operate at?
Application
Network
D and F
Data Link


Which of the following is not a vaild categorization of Firewall based on structure?
residential grade
application-based
hardware-based
commercial-grade


What layer of the OSI model do Circuit Layer Firewalls operate at?
Application Layer
Session Layer
Transport Layer
Network Layer


Which of the following is not a vaild categorization of Firewall based on processing mode?
Application filtering
Packet filtering Firewalls
Application gateway
Circuit gateway


Which level proxy provides protection at the session layer of OSI?
circuit
application
server
proxy


Which of the following is an INVALID common architectural implementation of firewall?
packet filtering routers
Dynamic Filtering
dual-homed firewalls
screened host firewalls


Which of the following host is sometimes called a dual-homed gateway or bastion host?
proxy
blocked
stub
sceened


Which generation firewalls are either application-level firewalls or proxy servers?
Second generation
Third Generation
First Generation
Fourth Generation