100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CTC 362 Midterm Exam | Questions with Verified Answers $18.99   Add to cart

Exam (elaborations)

CTC 362 Midterm Exam | Questions with Verified Answers

 6 views  0 purchase
  • Course
  • CTC 362
  • Institution
  • CTC 362

CTC 362 Midterm Exam | Questions with Verified Answers The firewall device must never be accessible directly from the ________________ network. Public ____________________ is a firewall type that keeps track of each network connection between internal and external systems using a table and that ...

[Show more]

Preview 2 out of 15  pages

  • October 30, 2024
  • 15
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CTC 362
  • CTC 362
avatar-seller
Bri254
CTC 362 Midterm Exam



The firewall device must never be accessible directly from the ____________________
network.
Public

____________________ is a firewall type that keeps track of each network connection
between internal and external systems using a table and that expedites the processing
of those communications.
Stateful packet inspection (SPI)

____________________ firewalls combine the elements of other types of firewalls —
that is, the elements of packet filtering and proxy services, or of packet filtering and
circuit gateways.
Hybrid

The restrictions most commonly implemented in packet-filtering firewalls are based on
__________.

a. IP source and destination address
b. TCP or UDP source and destination port
requests
c. Direction (inbound or outbound)
d. All of the above

Since the bastion host stands as a sole defender on the network perimeter, it is
commonly referred to as the __________ host.
Sacrificial

Which of the following is not a major processing-mode category for firewalls?
Router Passthru

__________ is the protocol for handling TCP traffic through a proxy server.
SOCKS

The ____________________ packet-filtering firewall allows only a particular packet with
a particular source, destination, and port address to enter through the firewall.
Dynamic

A ____________________ mode VPN establishes two perimeter tunnel servers to
encrypt all traffic that will traverse an unsecured network, with the entire client packet is

, encrypted and added as the data portion of a packet addressed from one tunneling
server to another.
Tunnel

Kerberos is based on the principle that the ____________________ knows the secret
keys of all clients and servers on the network.
Key Distribution Center (KDC)

The dominant architecture used to secure network access today is the __________
firewall.
screened subnet

SESAME uses ____________________ key encryption to distribute secret keys.
Public

The primary benefit of a VPN that uses _________ is that an intercepted packet reveals
nothing about the true destination system.
tunnel mode

A(n) ____________________ contains a computer chip that can verify and validate
several pieces of information instead of just a PIN.
smart card

A(n) ____________________ filter is a software filter — technically not a firewall — that
allows administrators to restrict access to content from within a network
Content

__________ filtering requires that the filtering rules governing how the firewall decides
which packets are allowed and which are denied be developed and installed with the
firewall.
Static

The ____________________ Access Controller Access Control System contains a
centralized database, and it validates the user's credentials at this TACACS server.
Terminal

__________ inspection firewalls keep track of each network connection between
internal and external systems.
Stateful

The application firewall is also known as a(n) ____________________ server.
Proxy

__________ and TACACS are systems that authenticate the credentials of users who
are trying to access an organization's network via a dial-up connection.
RADIUS

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Bri254. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $18.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$18.99
  • (0)
  Add to cart