Which type of firewall policy calls for a firewall to deny


Question 1. An activist can best be described as which of the following?

  • An unskilled programmer that spreads malicious scripts
  • Consider themselves seekers of knowledge
  • Use DoS attacks on websites with which they disagree
  • Deface websites by leaving messages for their friends to read

Question 2. Which type of firewall policy calls for a firewall to deny all traffic by default?

  • Permissive policy
  • Perimeter policy
  • Restrictive policy
  • Demilitarized policy

Question 3. What is a program that appears to do something useful but is actually malware?

  • Virus
  • Logic bomb
  • Trojan
  • Back door

Question 4. In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?

  • Basic
  • Challenge/response
  • Biometrics
  • Signature

Question 5. Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?

  • Malicious port scanning
  • Man-in-the-middle
  • Denial of service
  • Remote procedure call

Question 6. How large is the IPv6 address space?

  • 32 bits
  • 128 bits
  • 64 bits
  • 168 bits

Question 7. Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped?

  • TTL
  • Fragment Offset
  • ECN
  • Options

Question 8.8.Which protocol is responsible for automatic assignment of IP addresses?

  • DNS
  • DHCP
  • FTP
  • SNMP

Question 9. Which of the following is not an advantage of IPv6 versus IPv4?

  • Larger address space
  • Built-in security
  • Supports static configuration
  • NAT is unnecessary

Question 10. Which of the following is a valid IPv6 address?

  • 5BA4:2391:0:0:4C3E
  • 1080::8:800:200C:417A
  • 24::5B1A::346C
  • 5510:ABCD::34:1::2

Question 11. Which TCP flag can be the default response to a probe on a closed port?

  • RST
  • URG
  • PSH
  • SYN

Question 12. Which of the following is the description of a land attack?

  • The local host source address occurs in the packet.
  • Source and destination IP address/port are the same.
  • An illegal TCP flag is found in the segment header.
  • The attacker uses an undefined protocol number.

Question 13. What is the typical packet sequence for closing a TCP session?

  • FIN, FIN ACK, RST
  • FIN, ACK, FIN ACK, ACK
  • FIN ACK, FIN, ACK, RST
  • FIN, FIN ACK

Question 14. Which of the following is an element of the TCP header that can indicate that a connection has been established?

  • Flags
  • Stream index
  • SEQ/ACK analysis
  • Sequence number

Question 15. Of what category of attack is a DoS attack an example?

  • Bad header information
  • Single-packet attack
  • Multiple-packet attack
  • Suspicious data payload

Question 16. What uses mathematical calculations to compare routes based on some measurement of distance?

  • Route summarization
  • Link-state routing protocols
  • Routing metrics
  • Distance-vector routing protocols

Question 17. Which protocol that runs on Cisco routers shares information between Cisco devices?

  • CDP
  • TCP
  • bootp
  • SSH

Question 18. Which of the following is true about ACLs on Cisco routers?

  • There is an implicit deny any statement at the end of the ACL.
  • There is an explicit permit any statement at the beginning of the ACL.
  • ACLs are processed in reverse order so place high priority statements last.
  • ACLs bound to an interface apply to inbound and outbound traffic by default.

Question 19.19.Which of the following types of traffic does NOT travel through routers?

  • DNS zone transfers
  • ARP requests
  • SNMP status information
  • Network route information

Question 20. Which of the following types of passwords prevents a user from accessing privileged exec mode on a Cisco router?

  • Console
  • AUX
  • Enable
  • TTY

Solution Preview :

Prepared by a verified Expert
Financial Accounting: Which type of firewall policy calls for a firewall to deny
Reference No:- TGS01212912

Now Priced at $20 (50% Discount)

Recommended (90%)

Rated (4.3/5)