Section 12.9 Firewalls

11 September 2022
4.7 (114 reviews)
9 test answers

Unlock all answers in this set

Unlock answers (5)
question
You are configuring a network firewall to allow SMTP outbound e-mail traffic, and POP3 inbound e-mail traffic. Which of the following IP ports should you open on the firewall? (select two) a. 21 b. 110 c. 443 d. 25 e. 143
answer
110 25
question
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions? a. 21 b. 443 c. 80 d. 69 e. 23
answer
443
question
Which of the following actions taken directly improves system security on Windows systems? (select two) a. Use Task Schedule to take regular backups b. Disable automatic updates c. Enable the Windows firewall d. Install anti-virus software e. Configure 802.11n networking
answer
Enable the Windows firewall Install anti-virus software
question
Which of the following is a firewall function? a. FTP hosting b. Protocol converting c. Encrypting d. Packet filtering e. Packet rearranging
answer
Packet filtering
question
Which of the following is the best device to deploy to protect your private network from a public untrusted network? a. Hub b. Firewall c. Router d. Gateway
answer
Firewall
question
To access your company's internal network from home, you use Secure Shell (SSH). The administrator has recently implemented a firewall at the network perimeter and disabled as many ports as possible. Which port needs to remain open so you can still work from home? a. 443 b. 80 c. 21 d. 22 e. 23
answer
22
question
In which of the following situations should you install a firewall? a. You want to implement a password system for Internet users who access your private website b. You want to improve Internet performance by saving popular web sites locally c. You want internet users to see a single IP address when accessing your company network d. You want to restrict Internet users from accessing private data on your network
answer
You want to restrict Internet users from accessing private data on your network
question
You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open IP ports 80, 25, 110 and 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server? a. Web server, DNS server, DHCP server b. Email server, Newsgroup server, DNS server c. Web server, e-mail server d. Web server, DNS server, email server
answer
Web server, e-mail server
question
You want to be able to access your home computer using Remove Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer from outside of your home network. What should you do? a. Move your home computer outside of the firewall b. Configure a VPN connection to your computer. c. Open the firewall port from the Remote Desktop program d. Open the Telnet and FTP ports in your firewall
answer
Open the firewall port from the Remote Desktop program