Today an enterprise must consider when considering access


Configuring Windows Firewall :-

1. Today, an enterprise must consider __________ when considering access to its Web servers or any other servers exposed to the Internet.

a) a hard outer shell and soft inner system of defense

b) multiple layers of defense

c) outsourcing its defense

d) a single strong layer of defense

2. Starting with Windows XP, all Windows operating systems come equipped with a built-in __________ capable of protecting them from network-based attacks.

a) Group Policy Object

b) kill switch

c) antivirus application

d) firewall

3. The primary role of the firewall is to ?

a) block unauthorized access to and from the system.

b) quarantine any malware until it can be safely removed from the system.

c) shut down the system when someone makes an unauthorized attempt to access it.

d) allow specific authorized access to the system.

4. The firewall's secondary role is to ?

a) block unauthorized access to and from the system.

b) allow specific authorized access to the system using the same rules it uses to block unauthorized access.

c) quarantine any malware until it can be safely removed from the system.

d) shut down the system when someone makes an unauthorized attempt to access it.

5. Why would you want to use both host firewalls and network firewalls ?

a) You would not want to use both because a network firewall will cancel out a host firewall.

b) You would only use network firewalls as a backup after the host firewall failed.

c) Multiple layers of defense must be considered regarding access to Web servers or other servers exposed to the Internet.

d) All Windows operating systems come equipped with both types of firewalls installed so most enterprises simply use both of them.

6. By default, firewalls adopt a(n) __________ policy for any access request not specifically granted (allowed) through the firewall's rules.

a) exception

b) destroy

c) deny

d) quarantine

7. In the lab, you used a Web browser to attempt to connect to a Windows 2012 server using:

a) HTML.

b) File Transfer Protocol (FTP).

c) HTTP.

d) Internet Control Message Protocol (ICMP).

8. In the lab, you enabled __________ in Windows Firewall to allow the HTTP connection ?

a) cookies

b) a predefined rule

c) a deny policy

d) a configuration policy

9.  In the lab, you verified that the new rule ?

a) denies the new password policy.

b) accepts the new password policy.

c) denies HTTP connections.

d) allows HTTP connections.

10. Which of the following does a firewall use to block unauthorized access to the system?

a) Inbound rules

b) Outbound rules

c) Default policies

d) Audit policies

11. Which of the following does a firewall use to block unauthorized access from the system?

a) Inbound rules

b) Outbound rules

c) Default policies

d) Audit policies

12. Enabled on the network and properly configured, a firewall can block:

a) outside sources from being able to insert malware and viruses.

b) malicious insiders from stealing or altering company data.

c) social engineering attacks.

d) damage to the network from natural disasters.

13. By default, the Windows Firewall disables several important services such as File Transfer Protocol (FTP) and Internet Control Message Protocol (ICMP), which includes the:

a) HTTP connection.

b) Group Policy Object.

c) file system.

d) Ping command.

14. In the lab, you enabled a firewall rule that allowed users on an external network to connect to a Web server using HTTP. Which port is used for these connections?

a) TCP port 21

b) TCP port 22

c) TCP port 53

d) TCP port 80

15. Which of the following is a personal firewall that filters incoming and outgoing traffic by blocking unauthorized traffic to the local computer ?

a) Host-based Firewall

b) Windows Firewall with Advanced Security

c) IPtables Firewall

d) FortiGate Firewall

16. Windows Firewall with Advanced Security can be configured to support separate profiles based on whether ?

a) the user is an executive, manager, line employee, or guest.

b) the device is a desktop, laptop, tablet, smartphone, or other mobile device.

c) the computer is connected to a network at the office, home, or a public location.

d) the computer is attempting to connect to the Internet, intranet, or extranet.

17. Using __________, network traffic can be filtered based on Active Directory users and groups, both source and destination IP addresses, port number, or specific programs and services.

a) the Advanced Security profiles

b) the Active profile

c) HTTP connections

d) the Group Policy Management tool

18. In the Windows Firewall, a __________ arrow in front of the rule indicates that the rule is already enabled ?

a) black

b) gray

c) green

d) red

19.In the Windows Firewall, any rules preceded by a __________ arrow have not been enabled ?

a) black

b) gray

c) green

d) red

20. In the lab, how could you tell that the HTTP connection was accepted and the firewall rules were applied successfully?

a) The Internet Explorer browser displayed the IIS Server homepage on the Windows 2012 server.

b) The Internet Explorer browser displayed the Windows Firewall inbound rules on the Windows 2012 server.

c) The Internet Explorer browser displayed the Windows Firewall with Advanced Security on Local Computer screen.

d) The Internet Explorer browser displayed the Control Panel.

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: Today an enterprise must consider when considering access
Reference No:- TGS02326815

Now Priced at $20 (50% Discount)

Recommended (93%)

Rated (4.5/5)