Written Lab
In this section, write the answers to the following security questions. You can find the answers in Appendix A.
-
Which type of firewall interface does not use IP addresses?
-
Which type of firewall keeps track of existing connections passing through it?
-
If you wanted to ensure that your firewall could block inflammatory email, which type of service would you look for?
-
The main security issue with UTM devices is that they constitute a __________.
-
If you wanted to allow remote access to 500 users, which type of device is recommended?
-
If data from one of your subnets should be restricted from entering another subnet, the subnets should be configured as different __________.
-
A series of two doors with a small room between them is called a __________.
-
How does an ACL treat any traffic type by default?
-
What is a group of servers used to lure attackers called?
-
Logging, notification, and shunning are what types of reactions from what type of security...