Вы находитесь на странице: 1из 2

Firewall

--------
In this lesson, you will learn how firewalls were created to solve early network
security problems and how, as those problems changed, firewall technology has
adapted to keep networks protected.

Question 1
What did early packet filter firewalls do when they detected a packet that did not
comply with their rules? (Choose two.)
Select one or more:
Launched a DDOS attack on the sender’s IP address
Blocked the packet and sent a message to the sender [CORRECT ANSWER]
Marked the packet as suspect, but continued to send to the destination IP address
Silently dropped the packet [CORRECT ANSWER]

Question 2
What three key, additional security features do next-generation firewalls provide,
that legacy firewalls do not? (Choose three.)
Select one or more:
Application visibility and control [CORRECT ANSWER]
Web application firewall [CORRECT ANSWER]
Intrusion prevention system (IPS) [CORRECT ANSWER]
Packet-filtering based on IP address

Question 3
What additional functionality did second generation firewalls provide that early
packet filter firewalls did not?
Select one:
They looked up the IP address of the sender to determine if the source was on a
suspect network.
They examined packet headers to detect if the packet contained viruses.
They observed network connections over time and continuously examined conversations
between endpoints. [CORRECT ANSWER]
They were stateless firewalls that allowed rogue packets that did not belong to an
existing connection to pass through the firewall.

Question 4
What works closely with FortiGate next-generation firewall products to provide the
highest level of network security?
Select one:
Gartner
RFCs
FortiGuard Labs [CORRECT ANSWER]
NSS Labs

Question 5
In network security, what is the purpose of a firewall?
Select one:
To limit the number of users on the network
To control the flow of network traffic [CORRECT ANSWER]
To prevent authorized users from accessing corporate servers
To prevent unauthorized USB devices from being plugged in to a user’s endpoint

ATTEMPT #2

Question 3
With the explosion of the World Wide Web, the composition of network protocols
skewed heavily towards HTTP. What challenge did this shift pose to legacy
firewalls?
Select one:
Different web applications used the same HTTP port number, making it difficult for
firewalls to distinguish between applications. [CORRECT ANSWER]
HTTP was an application layer protocol that relied heavily on TCP.
Firewalls did not have visibility into HTTP ports.
HTTP request methods were too complex and diverse.

Вам также может понравиться