Soft inner system of defense

Assignment Help Basic Computer Science
Reference no: EM131531261

Configuring Windows Firewall :-

1. Today, an enterprise must consider __________ when considering access to its Web servers or any other servers exposed to the Internet.

a) a hard outer shell and soft inner system of defense

b) multiple layers of defense

c) outsourcing its defense

d) a single strong layer of defense

2. Starting with Windows XP, all Windows operating systems come equipped with a built-in __________ capable of protecting them from network-based attacks.

a) Group Policy Object

b) kill switch

c) antivirus application

d) firewall

3. The primary role of the firewall is to ?

a) block unauthorized access to and from the system.

b) quarantine any malware until it can be safely removed from the system.

c) shut down the system when someone makes an unauthorized attempt to access it.

d) allow specific authorized access to the system.

4. The firewall's secondary role is to ?

a) block unauthorized access to and from the system.

b) allow specific authorized access to the system using the same rules it uses to block unauthorized access.

c) quarantine any malware until it can be safely removed from the system.

d) shut down the system when someone makes an unauthorized attempt to access it.

5. Why would you want to use both host firewalls and network firewalls ?

a) You would not want to use both because a network firewall will cancel out a host firewall.

b) You would only use network firewalls as a backup after the host firewall failed.

c) Multiple layers of defense must be considered regarding access to Web servers or other servers exposed to the Internet.

d) All Windows operating systems come equipped with both types of firewalls installed so most enterprises simply use both of them.

6. By default, firewalls adopt a(n) __________ policy for any access request not specifically granted (allowed) through the firewall's rules.

a) exception

b) destroy

c) deny

d) quarantine

7. In the lab, you used a Web browser to attempt to connect to a Windows 2012 server using:

a) HTML.

b) File Transfer Protocol (FTP).

c) HTTP.

d) Internet Control Message Protocol (ICMP).

8. In the lab, you enabled __________ in Windows Firewall to allow the HTTP connection ?

a) cookies

b) a predefined rule

c) a deny policy

d) a configuration policy

9.  In the lab, you verified that the new rule ?

a) denies the new password policy.

b) accepts the new password policy.

c) denies HTTP connections.

d) allows HTTP connections.

10. Which of the following does a firewall use to block unauthorized access to the system?

a) Inbound rules

b) Outbound rules

c) Default policies

d) Audit policies

11. Which of the following does a firewall use to block unauthorized access from the system?

a) Inbound rules

b) Outbound rules

c) Default policies

d) Audit policies

12. Enabled on the network and properly configured, a firewall can block:

a) outside sources from being able to insert malware and viruses.

b) malicious insiders from stealing or altering company data.

c) social engineering attacks.

d) damage to the network from natural disasters.

13. By default, the Windows Firewall disables several important services such as File Transfer Protocol (FTP) and Internet Control Message Protocol (ICMP), which includes the:

a) HTTP connection.

b) Group Policy Object.

c) file system.

d) Ping command.

14. In the lab, you enabled a firewall rule that allowed users on an external network to connect to a Web server using HTTP. Which port is used for these connections?

a) TCP port 21

b) TCP port 22

c) TCP port 53

d) TCP port 80

15. Which of the following is a personal firewall that filters incoming and outgoing traffic by blocking unauthorized traffic to the local computer ?

a) Host-based Firewall

b) Windows Firewall with Advanced Security

c) IPtables Firewall

d) FortiGate Firewall

16. Windows Firewall with Advanced Security can be configured to support separate profiles based on whether ?

a) the user is an executive, manager, line employee, or guest.

b) the device is a desktop, laptop, tablet, smartphone, or other mobile device.

c) the computer is connected to a network at the office, home, or a public location.

d) the computer is attempting to connect to the Internet, intranet, or extranet.

17. Using __________, network traffic can be filtered based on Active Directory users and groups, both source and destination IP addresses, port number, or specific programs and services.

a) the Advanced Security profiles

b) the Active profile

c) HTTP connections

d) the Group Policy Management tool

18. In the Windows Firewall, a __________ arrow in front of the rule indicates that the rule is already enabled ?

a) black

b) gray

c) green

d) red

19.In the Windows Firewall, any rules preceded by a __________ arrow have not been enabled ?

a) black

b) gray

c) green

d) red

20. In the lab, how could you tell that the HTTP connection was accepted and the firewall rules were applied successfully?

a) The Internet Explorer browser displayed the IIS Server homepage on the Windows 2012 server.

b) The Internet Explorer browser displayed the Windows Firewall inbound rules on the Windows 2012 server.

c) The Internet Explorer browser displayed the Windows Firewall with Advanced Security on Local Computer screen.

d) The Internet Explorer browser displayed the Control Panel.

Reference no: EM131531261

Questions Cloud

Acquiring professional credentials : What avenues should an aspiring information security professional use in acquiring professional credentials?
How is nominal effective exchange rate index constructed : How is a nominal effective exchange rate index constructed?
What are the criteria by which address decoders are judged : What does primary address range mean when it is applied to a system using partial address decoding?
Which of the following are major construct of existentialism : According to person-centered theory, for someone to be continuously believed and trusted by a client they must.
Soft inner system of defense : Today, an enterprise must consider __________ when considering access to its Web servers or any other servers exposed to the Internet.
Calculate the cost of perferred stock : In addition, flotation costs of $6.40 per share were paid. Calculate the cost of perferred stock.
Is the option to delay the project valuable : One of your colleagues pointed out that instead of starting construction before the FDA approval, Is the option to delay the project valuable? Explain.
Draw a lan diagram with 12 computers : Draw a LAN diagram with 12 computers, 3 printers, and a switch, the switch should be located in a seperate room.
What is meant by the term partial address decoding : A microcomputer designer decides to implement the simplest possible partial address decoder. Three 1-Mbyte blocks of memory are arranged.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Application and database services

Please read this in its entirety before answering. Please provide references also. Many organizations are using cloud services to provide application and database services to their users and their customers.

  What social engineering and physical security aspects

What sort of attacks would work in this case. Give some examples and how you would carry them out. What social engineering and physical security aspects were discovered/devised. Give a detailed explanation.

  See hidden file by looking at floppy using windows explorer

Would you see hidden file by just looking at the floppy using Windows Explorer? Why or Why not? What other tools could you use to retrieve evidence?

  Disposal of technology devices and gadgets

This assignment requires you to use more presentation tools and allows you to be creative. It switches gears and addresses the disposal of our technology devices and gadgets.

  Nonlinear regression methods

Describe one unique and specific example where you would use Nonlinear Regression methods or Neural Networks and explain WHY. Use references and justification to support your point of view. 100 word minimum and please use APA format. this is a dat..

  Determine what believe the top-five challenges integrating

Autonomous vehicles utilize integrated imaging and vision systems, sensor systems, and control systems to "drive a car". Determine what you believe are the top-five challenges of integrating these systems

  Identify the wmi classes and specific properties

Identify the WMI Classes and specific properties of the classes that contain each piece of information.

  The contacting surface between a and d is smooth

The contacting surface between A and D is smooth.

  Wi-fi upstream vs downstream

On wireless WANs, downstream data transmission is typically faster than upstream transmission. What types of limitations does this bring to an office environment? Why do you think this should be a consideration in WAN configuration?

  Declare a deque container

Declare a deque container. Using keyboard to input several floating point numbers, say at least five floating point numbers; find the median number and display the result.

  Additional way of viewing information

In addition to the existing view of the emergency data, they want an administrative overview of all emergencies and the proposed responses.

  Compute the concentration ratio for the relevant market

Who are the leading firms and what are their market shares? Compute the concentration ratio for the relevant market.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd