logo image

Chapter 6 Quiz – Firewall Configuration and Administration

rule set
The cornerstone of most firewalls is the ____, a set of instructions based on organizational policy, configured by the administrator.
least privilege
If you decide to first restrict all transmissions through the gateway except a specific set of services, you are following the principle of ____.
In Order
The ____ approach processes firewall rules in top-to-bottom order.
Best Fit
With the ____ approach, the firewall determines the order in which the rules are processed.
Allow-All
A(n) ____ approach allows all packets to pass through except those specified to be blocked.
scalable
A firewall must be ____ so its performance can grow along with the network it protects.
IP forwarding
If a proxy server is in service, ____ should be disabled on routers and other devices that lie between the networks.
16.5 million
The IP range 10.x.x.x provides about ____ addresses.
encryption
SSL supports firewall-based ____.
MemoryUsage = (ConcurrentConnections)/
(AverageLifetime)*(AverageLifetime + 50 seconds)*120
The formula for calculating memory usage for Check Point’s FW-1 NG firewall is ____.
SecurityFocus
____ is the hub for a large mailing list that features frequent announcements about security flaws.
Common Vulnerabilities and Exposures Database
____provides a baseline index point for evaluating coverage of tools and services.
monthly
It is good practice to set aside time to perform firewall maintenance ____.
choose good passwords that you then guard closely
Different types of hardware can be secured in different ways, but one of the most important ways is to ____.
Distributed firewalls
____ are installed at all endpoints of the network, including the remote computers that connect to the network through VPNs.
GAISP
In 2003, GASSP was succeeded by ____.
environmental
GAISP recommends the ____ management of IT assets and resources.
BIOS
Having a ____ password in place prevents someone from starting up your computer and accessing your hard disk files with a floppy disk called a boot disk.
Caching
____ of frequently accessed resources, such as Web page text and image files, can dramatically speed up the performance of your network because it reduces the load on your Web servers.
heartbeat network
____ monitors the operation of the primary firewall and synchronizes the state table connections so the two firewalls have the same information at any given time
Open Platform for Security (OPSEC)
The ____ lets you extend their functionality and integrate virus scanning into their set of abilities.

Need essay sample on "Chapter 6 Quiz – Firewall Configuration and Administration"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy