The cornerstone of most firewalls is the ____, a set of instructions based on organizational policy, configured by the administrator.
If you decide to first restrict all transmissions through the gateway except a specific set of services, you are following the principle of ____.
The ____ approach processes firewall rules in top-to-bottom order.
With the ____ approach, the firewall determines the order in which the rules are processed.
A(n) ____ approach allows all packets to pass through except those specified to be blocked.
A firewall must be ____ so its performance can grow along with the network it protects.
If a proxy server is in service, ____ should be disabled on routers and other devices that lie between the networks.
The IP range 10.x.x.x provides about ____ addresses.
SSL supports firewall-based ____.
MemoryUsage = (ConcurrentConnections)/
(AverageLifetime)*(AverageLifetime + 50 seconds)*120
The formula for calculating memory usage for Check Point’s FW-1 NG firewall is ____.
____ is the hub for a large mailing list that features frequent announcements about security flaws.
Common Vulnerabilities and Exposures Database
____provides a baseline index point for evaluating coverage of tools and services.
It is good practice to set aside time to perform firewall maintenance ____.
choose good passwords that you then guard closely
Different types of hardware can be secured in different ways, but one of the most important ways is to ____.
____ are installed at all endpoints of the network, including the remote computers that connect to the network through VPNs.
In 2003, GASSP was succeeded by ____.
GAISP recommends the ____ management of IT assets and resources.
Having a ____ password in place prevents someone from starting up your computer and accessing your hard disk files with a floppy disk called a boot disk.
____ of frequently accessed resources, such as Web page text and image files, can dramatically speed up the performance of your network because it reduces the load on your Web servers.
____ monitors the operation of the primary firewall and synchronizes the state table connections so the two firewalls have the same information at any given time
Open Platform for Security (OPSEC)
The ____ lets you extend their functionality and integrate virus scanning into their set of abilities.
Need essay sample on "Chapter 6 Quiz – Firewall Configuration and Administration"? We will write a custom essay sample specifically for you for only $ 13.90/page