单选题What is meant by the term "firewall sandwich"?()Amultiple layers of firewallingBa method of operating firewalls from multiple vendorsCfirewall connections in either an active or standby stateDan architecture in which all traffic between firewalls goes through application-specific serversEan architecture in which all traffic between firewalls goes through application-specific gateways

单选题
What is meant by the term "firewall sandwich"?()
A

multiple layers of firewalling

B

a method of operating firewalls from multiple vendors

C

firewall connections in either an active or standby state

D

an architecture in which all traffic between firewalls goes through application-specific servers

E

an architecture in which all traffic between firewalls goes through application-specific gateways


参考解析

解析: 暂无解析

相关考题:

Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations.What should you do?()A. Configure dynamic NAT on the firewall.B. Configure the firewall to allow the use of Teredo.C. Configure a link local IPv6 address for the internal interface of the firewall.D. Configure a global IPv6 address for the external interface of the firewall.

Basically, a firewall is a(145)process or a set of integrated processes that runs on a router or(146)to control the flow of networked application traffic(147)through it. Typically, firewalls are placed on the entry point to a(148)network such as the Internet. They could be considered traffic cops. The firewall's(149)is to ensure that all communication between an organization's network and the Internet conform. to the organization's policies.A.dependentB.isolatedC.relatedD.standalone

Basically, a(71)is a standalone process or a set of integrated processes that runs on a router or server to control the flow of(72)application traffic(73)through it. Typically, firewalls are(74)on the entry point to a public network such as the Internet. They could be considered traffic cops. The firewall' s(75)is to ensure that all communication between an organization's network and the Internet conform. to the organization's security policies.A.routerB.clientC.firewallD.switch

Refer to the exhibit. When deploying an MSFC and an FWSM, which statement is correct?() A. Proper placement depends on the VLAN assignment.B. Place it outside the firewall.C. Place it inside the firewall to make design and management easier.D. Place it inside the firewall with multiple context modes connecting to all configured contexts.

Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?()A、 Layer 3 routing between the Access and Aggregation layers facilities the ability to span VLANsacross multiple access switches, which is a requirement for many server virtualization andclustering technologies.B、 “East-west” server-to-server traffic can travel between aggregation modules by way of the core,but backup and replication traffic typically remains within an aggregation module.C、 Load balancing, firewall service, and other network service are commonly integrated by the useof service modules that are inserted in the aggregation switched.D、 Virtualization tools allow a cost effective approach for redundancy in the network design byusing two or four VDCs from the same physical switch.

It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()A、 single layer of firewallingB、 multiple layers of firewallingC、 firewall connections in either an active or standby stateD、 an architecture in which all traffic between firewalls goes through application-specific servers

What is meant by the term "firewall sandwich"?()A、multiple layers of firewallingB、a method of operating firewalls from multiple vendorsC、firewall connections in either an active or standby stateD、an architecture in which all traffic between firewalls goes through application-specific serversE、an architecture in which all traffic between firewalls goes through application-specific gateways

Which two statements are true about firewall filter configurations?()A、Multiple action modifiers can be included in the same term.B、Only a single action modifier can be included in the same term.C、The default term within a firewall filter uses the discard action.D、The default term within a firewall filter uses the reject action.

Your network contains one Active Directory domain. You have a member server that runs Windows Server 2008.You need to immediately disable all incoming connections to the server. What should you do?()A、From the Services snap-in,disable the IP Helper.B、From the Services snap-in,disable the Netlogon service.C、From Windows Firewall,enable the Block all connections option on the Public Profile.D、From Windows Firewall enable the Block all connections option on the Domain Profile.

What is a virtual firewall?()A、another name for a firewall deployed in routed modeB、another name for a firewall deployed in transparent modeC、a separation of multiple firewall security contexts on a single firewallD、a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE、a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)

Which of the following is the BEST reason to implement a firewall on a server?()A、To watch for bandwidth issuesB、To protect the server from all trafficC、To block certain traffic by portsD、To monitor certain malicious traffic

While performing a site survey to document the existing environment before implementing a new HACMP cluster, it was discovered that a port filtering firewall was being used to protect the production system. The plan is to continue using the firewall and add a second firewall to avoid a single point of failure. Each node in the two-node cluster will have all of its network adapters connected to the firewalls, and all connections to the nodes will pass through these firewalls.  What must be considered about HACMP in a firewall environment?()  A、 Firewalls are not supported in a HACMP environment.B、 HACMP uses only TCP/IP so firewalls are not relevant.C、 Specific ports must be open for HACMP communications.D、 Dynamic routing must be used to properly route packets in a firewall-protected environment.

You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A、 From Windows Firewall, add an exceptionB、 From windows Firewall enable the block all incoming connections optionC、 From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD、 From the Windows Firewall with Advanced Security snap-in, create an outbound rule.

Your network contains one Active Directory domain. You have a member server that runs Windows Server 2008 R2.You need to immediately disable all incoming connections to the server. What should you do?()A、From the Services snap-in, disable the IP Helper.B、From the Services snap-in, disable the Netlogon service.C、From Windows Firewall, enable the Block all connections option on the Public Profile.D、From Windows Firewall, enable the Block all connections option on the Domain Profile.

Your network contains one Active Directory domainl. You have a member server that runs Windows Server 2008. You need to immediately disable all incoming connections to the server. What should you do?()A、From the Services snap-in disable the IP HelpderB、Fom the Services snap-in disable the Net Logon ServiceC、From Windows Firewall, enable the Block all connections option on the Public ProfileD、From the Windows Firewall, enable the Block all connections option on the Domain Profile

You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations. What should you do?()A、Configure dynamic NAT on the firewall.B、Configure the firewall to allow the use of Teredo.C、Configure a link local IPv6 address for the internal interface of the firewall.D、Configure a global IPv6 address for the external interface of the firewall.

单选题It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()A single layer of firewallingB multiple layers of firewallingC firewall connections in either an active or standby stateD an architecture in which all traffic between firewalls goes through application-specific servers

单选题You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()AAllow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.BAllow all inbound VPN traffic to pass through the perimeter firewall only.  CAllow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.DAllow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

单选题While performing a site survey to document the existing environment before implementing a new HACMP cluster, it was discovered that a port filtering firewall was being used to protect the production system. The plan is to continue using the firewall and add a second firewall to avoid a single point of failure. Each node in the two-node cluster will have all of its network adapters connected to the firewalls, and all connections to the nodes will pass through these firewalls.  What must be considered about HACMP in a firewall environment?()A Firewalls are not supported in a HACMP environment.B HACMP uses only TCP/IP so firewalls are not relevant.C Specific ports must be open for HACMP communications.D Dynamic routing must be used to properly route packets in a firewall-protected environment.

单选题You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A From Windows Firewall, add an exceptionB From windows Firewall enable the block all incoming connections optionC From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD From the Windows Firewall with Advanced Security snap-in, create an outbound rule.

单选题Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?()A Layer 3 routing between the Access and Aggregation layers facilities the ability to span VLANsacross multiple access switches, which is a requirement for many server virtualization andclustering technologies.B “East-west” server-to-server traffic can travel between aggregation modules by way of the core,but backup and replication traffic typically remains within an aggregation module.C Load balancing, firewall service, and other network service are commonly integrated by the useof service modules that are inserted in the aggregation switched.D Virtualization tools allow a cost effective approach for redundancy in the network design byusing two or four VDCs from the same physical switch.

单选题Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations. What should you do?()AConfigure dynamic NAT on the firewall.BConfigure the firewall to allow the use of Teredo.CConfigure a link local IPv6 address for the internal interface of the firewall.DConfigure a global IPv6 address for the external interface of the firewall.

单选题You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B Allow all inbound VPN traffic to pass through the perimeter firewall only.C Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

单选题Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations. What should you do? ()AConfigure dynamic NAT on the firewallBConfigure the firewall to allow the use of TeredoCConfigure a link local IPv6 address for the internal interface of the firewallDConfigure a global IPv6 address for the external interface of the firewall

单选题What is a virtual firewall?()Aanother name for a firewall deployed in routed modeBanother name for a firewall deployed in transparent modeCa separation of multiple firewall security contexts on a single firewallDa firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextEa firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).A firewall separates the internal network from the Internet.  The firewall blocks all outbound traffic except for HTTP and SMTP traffic.You install a DNS server. The DNS server is configured to use the default root hints. You need to ensure that the DNS server can resolve the host names on the Internet.  Which port should you open on the firewall?()A53B135C500D3389