A) Check Point
B) Cisco
C) D-Link
D) Wolverine
Correct Answer
verified
Multiple Choice
A) Encryption can be added with a free Web download.
B) It includes built-in VPN capabilities.
C) It is expensive.
D) It works on Linux,Unix,Solaris,and Windows platforms.
Correct Answer
verified
Multiple Choice
A) They are likely to contain several different operating systems.
B) They are likely to be supported by multiple network administrators.
C) They are usually easier to manage and secure.
D) They are usually made up of several interconnected networks.
Correct Answer
verified
Multiple Choice
A) All models contain built-in encryption.
B) They are relatively inexpensive.
C) They include built-in proxy server capabilities.
D) They work on Linux,Unix,Solaris,and Windows platforms.
Correct Answer
verified
Multiple Choice
A) McAfee Personal Firewall
B) SonicWALL
C) Symantec Norton Firewall
D) Wolverine
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) combination hardware\software firewall
B) screened host firewall
C) simple hardware firewall
D) single machine firewall
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Blocking incoming traffic on selected ports
B) Online scanning of system for vulnerabilities
C) Performing traceroute to show the source of incoming packets
D) Recording a log of all attempts at incoming packets
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Check Point
B) Cisco
C) D-Link
D) Wolverine
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Blocking of outgoing traffic
B) Data recovery
C) Privacy protection
D) Popup ad blocking
Correct Answer
verified
Multiple Choice
A) It blocks incoming and outgoing packets.
B) It is a screened host firewall.
C) It has a logging feature enabled by default.
D) It works best in conjunction with a perimeter firewall.
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) It automatically blocks and logs oversized packets.
B) It is particularly vulnerable to SYN floods.
C) It is a packet filtering,application gateway hybrid.
D) It uses Stateful Packet Inspection.
Correct Answer
verified
Multiple Choice
A) Check Point Firewall-1
B) Cisco PIX 515E
C) Fortigate 3600
D) Windows XP Internet Connection Firewall
Correct Answer
verified
Showing 1 - 19 of 19
Related Exams