Sie sind auf Seite 1von 3

Source http://searchsecurity.techtarget.

com/quiz/Playing-with-firewalls

1.) What type of firewall monitors SMTP traffic for anomalies and signature-based
attacks?
A. XML firewall
B. e-mail firewall
C. packet-inspection firewall
D. desktop firewall

Answer from E-mail firewalls: A vital defense layer:


"E-mail firewalls provide antivirus and antispam functionality, and
protect against directory harvest attacks. They can include features such
as Web-based administration and mail services, and the ability to
receive mail from multiple domains. The appliances monitor SMTP
traffic for anomalies and signature-based attacks.
2.) What governs the type of traffic that is and is not allowed through a
firewall?
A. rule base
B. gateway
C. access control list
D. partition
"In the context of a computer server acting as a firewall, a rule base is a set of
rules that govern what is and what is not allowed through the firewall.

3.) What firewall topology utilizes a triple-homed firewall?


A. series circuit
B. bastion host

C. screened subnet
D. dual firewalls

4.) What advanced firewall architecture examines both incoming and


outgoing packets down to the application layer?
A. fail-safe
B. static-packet filtering
C. series circuit
D. stateful inspection
5.) What type of firewall separates message-level security from
transport-layer security?
A. XML firewall
B. e-mail firewall
C. packet-inspection firewall
D. desktop firewall
The primary difference between an XML firewall and other firewalls is that
much of the features in an XML firewall exist at the application layer and within
the data payload or content, as opposed to the transport and session layer.
Many modern XML firewalls act like high performance proxies. They can
approach wire speed performance by offloading crytpo and XML validation
functions to dedicated hardware. In this role, the XML firewall performs
security services such as authentication, authorization, auditing (AAA) and
XML validation at a message level. Features such as message routing,
encryption and forwarding to diverse systems are commonplace. These
features do not act as transport-level connection security like SSL. The
features are a separation of message-level security from transport-level
security

6.) When deploying dual firewalls in a parallel fashion, it's best to


configure them so that in the event of a failure, both firewalls
automatically block all traffic. What is this configuration called?
A. fair share
B. load balancing
C. series circuit
D. fail-safe
"Both firewalls should be configured to fail-safe, that is, in the event of a
failure, they should automatically block all traffic."

Das könnte Ihnen auch gefallen