Questions With Solutions 100% Solved
You have just installed a packet-filtering firewall Port number/source address of a
packet/destination address of a packet
Which of the following describes how access lists An access list filters traffic based on the
IP header information such as source or destination IP address, protocol, or socket numbers.
You have used firewalls to create a demilitarized zone Put the Database on the private
network/Put the Web server inside the DMZ
when designing a firewall, what is the recommended approach Close all ports, open only
ports required
Match the firewall type Layer 2- V
Layer 3- R
Counts-R
Does-V
Different-R
,Testout Network Pro Ch 1-8 Exams and Labs
Questions With Solutions 100% Solved
Same-V
Your Cisco router has three Add a permit
Which firewall implementation creates a buffer DMZ
Which of the following are true about routed firewalls Supports
Counts
An All-in-one security appliance is best a Remote
Which of the following features are common functions Bandwith shaping
Spam Filtering
You recently installed a new all-in-one security appliance in a remote office Change the
default
Configure the device's authentication
,Testout Network Pro Ch 1-8 Exams and Labs
Questions With Solutions 100% Solved
Which of the following prevents access based on website ratings Content filter
You manage a server that runs your company website Proxy Server
Based on the diagram, which type of proxy is handling the client's request Reverse
Which of the following network services or protocols uses TCP/IP port 22 SSH
Which port number is used by SNMP 161
Which protocol and port number is used by BOOTP UDP 67
To increase security on your company's internal network 443
, Testout Network Pro Ch 1-8 Exams and Labs
Questions With Solutions 100% Solved
You are monitoring network traffic on your network and you see a large amount of traffic
between a Windows The workstation is using NetBIOS to access shared resources on the
server
You are monitoring network traffic on your network, and you see traffic between two network
hosts on port 2427 Someone is using Voice over IP VOIP
You have been given a laptop to use for work Host-based
You have just installed a packet-filtering firewall on your network Destination address
Port number
Source address
You provide Internet access for a local school Application Level
A small startup company has hired The UTM represents a single point of failure
Match the firewall type on the right Packet Filtering Firewall- 3