Physical and Hardware Security
Physical and Hardware Security
Written Lab
In this section, write the answers to the following security questions:
1. Which type of security device employs a redirection device known as a honeypot?
2. Which type of firewall keeps track of existing connections passing through it?
3. If you wanted to ensure that your firewall could block inflammatory email, which type of
service would you look for?
4. A firewall’s list of rules that it uses to block traffic is called ___________________.
5. If you wanted to allow remote access to 500 users, which type of device is recommended?
6. If data from one of your subnets should be restricted from entering another subnet, the
subnets should be configured as different ___________________.
7. Which unsecure protocol uses port 80 by default?
8. Which unsecure protocol utilizes arbitrary port numbers to complete its work?
9. What port number does Secure Shell (SSH) use by default?
10. Logging, notification, and shunning are what types of reactions from what type of
security device?
(The answers to the Written Lab can be found following the answers to the Review
Questions for this chapter.)
Review Questions 537
Review Questions
1. In general, firewalls work by ___________________.
A. Rejecting all packets regardless of security restrictions
B. Forwarding all packets regardless of security restrictions
C. Allowing only packets that pass security restrictions to be forwarded
D. None of the above
2. Which layer of the OSI model do software firewalls operate in? (Choose all that apply.)
A. Application
B. Presentation
C. Physical
D. Network
3. What is the main difference between a network-based firewall and a host-based firewall?
A. A network-based firewall protects the Internet from attacks.
B. A network-based firewall protects a network, not just a single host.
C. A network-based firewall protects the network wires.
D. A network-based firewall protects a CD from data loss.
4. What is one advantage that a stateless firewall has over its stateful counterparts?
A. It’s faster.
B. It utilizes less memory.
C. It’s better at preventing network attacks.
D. It works better on external networks.
5. A network administrator needs to filter unwanted packets when implementing the companies’
security policies. What should be implemented to help exercise control over future
network traffic?
A. Access control list (ACL)
B. Proxy server
C. Intrusion Prevention System
D. VPN concentrator
6. What is the benefit of using a firewall?
A. Protects external users
B. Protects external hardware
C. Protects LAN resources
D. Protects hardware from failure
538 Chapter 15 Physical and Hardware Security
n
7. Your company uses a custom TCP port number of 9080 that is hosted on your DMZ server.
Users can no longer access a custom application that uses this port. You’ve verified that
the firewall is permitting this TCP port. Which command can you use to verify the DMZ
server is still accepting connections on TCP port 9080?
A. ping
B. telnet
C. nbtstat
D. netstat
E. ipconfig
8. Which device can limit traffic on a network and allow access onto specific TCP/IP port
numbers when security is a concern?
A. Hub
B. Firewall
C. DNS
D. Modem
9. Which is not a type of access control list (ACL)?
A. Standard
B. Extended
C. Referred
D. Outbound
10. A network administrator is creating an outbound ACL. Which of the following is not a
general access-list guideline that should be followed when the network administrator is
creating and implementing ACLs on the router?
A. Use only one ACL per interface per protocol per direction.
B. Place IP-extended ACLs as far away from the source as possible.
C. Create ACLs and then apply them to an interface.
D. Every list should have at least one permit statement or it will deny all traffic.
11. What is the best explanation for a DMZ?
A. To separate a security zone for an IPS and IDS server
B. To create a security zone for VPN terminations
C. To create a security zone that allows public traffic but is isolated from the private
inside network
D. To create a security zone that allows private traffic but is isolated from the public
network
Review Questions 539
12. Which of the following are types of services that firewalls can provide? (Choose all that apply.)
A. Content filtering
B. Segregate network segments
C. Signature identification
D. Scanning services
E. All of the above
13. Which type of security device monitors network traffic, looking for signs of an intrusion?
A. Intrusion Detection System
B. Demilitarized zone (DMZ)
C. Firewall
D. VPN concentrator
14. Which of these application-layer protocols is not secure?
A. SSH
B. HTTP
C. HTTPS
D. SNMPv3
15. Which of these application-layer protocols is secure?
A. SFTP
B. RSH
C. SNMPv1
D. SNMPv2
16. Changing network configurations, terminating sessions, and deceiving the attacker are
actions that can be taken from what type of security device?
A. Access control list (ACL)
B. Content filtering
C. Security zones
D. Intrusion Prevention System (IPS)
17. Which of the following are access-control principles that should be followed? (Choose all
that apply.)
A. Use implicit deny or allow.
B. Follow the least-privilege model.
C. Separate out administrative duties.
D. Rotate administrator jobs.
E. All of the above
540 Chapter 15 Physical and Hardware Security
n