What is meant by the term "firewall sandwich"?()A、multiple layers of firewallingB、a method of operating firewalls from multiple vendorsC、firewall connections in either an active or standby stateD、an architecture in which all traffic between firewalls goes through application-specific serversE、an architecture in which all traffic between firewalls goes through application-specific gateways
What is meant by the term "firewall sandwich"?()
- A、multiple layers of firewalling
- B、a method of operating firewalls from multiple vendors
- C、firewall connections in either an active or standby state
- D、an architecture in which all traffic between firewalls goes through application-specific servers
- E、an architecture in which all traffic between firewalls goes through application-specific gateways
相关考题:
Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations.What should you do?()A. Configure dynamic NAT on the firewall.B. Configure the firewall to allow the use of Teredo.C. Configure a link local IPv6 address for the internal interface of the firewall.D. Configure a global IPv6 address for the external interface of the firewall.
Basically, a firewall is a(145)process or a set of integrated processes that runs on a router or(146)to control the flow of networked application traffic(147)through it. Typically, firewalls are placed on the entry point to a(148)network such as the Internet. They could be considered traffic cops. The firewall's(149)is to ensure that all communication between an organization's network and the Internet conform. to the organization's policies.A.dependentB.isolatedC.relatedD.standalone
Basically, a(71)is a standalone process or a set of integrated processes that runs on a router or server to control the flow of(72)application traffic(73)through it. Typically, firewalls are(74)on the entry point to a public network such as the Internet. They could be considered traffic cops. The firewall' s(75)is to ensure that all communication between an organization's network and the Internet conform. to the organization's security policies.A.routerB.clientC.firewallD.switch
Which two statements are correct about firewall filters in the Junos OS?() A. Firewall filters are stateless.B. Firewall filters are used to control routing information that is exchanged between devices.C. Firewall filters are used to control traffic passing through the device.D. Firewall filters can only be applied to traffic entering the device.
Refer to the exhibit. When deploying an MSFC and an FWSM, which statement is correct?() A. Proper placement depends on the VLAN assignment.B. Place it outside the firewall.C. Place it inside the firewall to make design and management easier.D. Place it inside the firewall with multiple context modes connecting to all configured contexts.
Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?()A、 Layer 3 routing between the Access and Aggregation layers facilities the ability to span VLANsacross multiple access switches, which is a requirement for many server virtualization andclustering technologies.B、 “East-west” server-to-server traffic can travel between aggregation modules by way of the core,but backup and replication traffic typically remains within an aggregation module.C、 Load balancing, firewall service, and other network service are commonly integrated by the useof service modules that are inserted in the aggregation switched.D、 Virtualization tools allow a cost effective approach for redundancy in the network design byusing two or four VDCs from the same physical switch.
It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()A、 single layer of firewallingB、 multiple layers of firewallingC、 firewall connections in either an active or standby stateD、 an architecture in which all traffic between firewalls goes through application-specific servers
Which two statements are true about firewall filter configurations?()A、Multiple action modifiers can be included in the same term.B、Only a single action modifier can be included in the same term.C、The default term within a firewall filter uses the discard action.D、The default term within a firewall filter uses the reject action.
Your network contains one Active Directory domain. You have a member server that runs Windows Server 2008.You need to immediately disable all incoming connections to the server. What should you do?()A、From the Services snap-in,disable the IP Helper.B、From the Services snap-in,disable the Netlogon service.C、From Windows Firewall,enable the Block all connections option on the Public Profile.D、From Windows Firewall enable the Block all connections option on the Domain Profile.
What is a virtual firewall?()A、another name for a firewall deployed in routed modeB、another name for a firewall deployed in transparent modeC、a separation of multiple firewall security contexts on a single firewallD、a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE、a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
Which of the following is the BEST reason to implement a firewall on a server?()A、To watch for bandwidth issuesB、To protect the server from all trafficC、To block certain traffic by portsD、To monitor certain malicious traffic
While performing a site survey to document the existing environment before implementing a new HACMP cluster, it was discovered that a port filtering firewall was being used to protect the production system. The plan is to continue using the firewall and add a second firewall to avoid a single point of failure. Each node in the two-node cluster will have all of its network adapters connected to the firewalls, and all connections to the nodes will pass through these firewalls. What must be considered about HACMP in a firewall environment?() A、 Firewalls are not supported in a HACMP environment.B、 HACMP uses only TCP/IP so firewalls are not relevant.C、 Specific ports must be open for HACMP communications.D、 Dynamic routing must be used to properly route packets in a firewall-protected environment.
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).A firewall separates the internal network from the Internet. The firewall blocks all outbound traffic except for HTTP and SMTP traffic.You install a DNS server. The DNS server is configured to use the default root hints. You need to ensure that the DNS server can resolve the host names on the Internet. Which port should you open on the firewall?()A、53B、135C、500D、3389
You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A、 From Windows Firewall, add an exceptionB、 From windows Firewall enable the block all incoming connections optionC、 From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD、 From the Windows Firewall with Advanced Security snap-in, create an outbound rule.
Your network contains one Active Directory domain. You have a member server that runs Windows Server 2008 R2.You need to immediately disable all incoming connections to the server. What should you do?()A、From the Services snap-in, disable the IP Helper.B、From the Services snap-in, disable the Netlogon service.C、From Windows Firewall, enable the Block all connections option on the Public Profile.D、From Windows Firewall, enable the Block all connections option on the Domain Profile.
Your network contains one Active Directory domainl. You have a member server that runs Windows Server 2008. You need to immediately disable all incoming connections to the server. What should you do?()A、From the Services snap-in disable the IP HelpderB、Fom the Services snap-in disable the Net Logon ServiceC、From Windows Firewall, enable the Block all connections option on the Public ProfileD、From the Windows Firewall, enable the Block all connections option on the Domain Profile
You are designing the settings for FinServ. You specify the permissions that will be used. You need to specify any additional settings required by the company. What should you do?()A、Install a digital certificate for Encrypting File System (EFS) on FinServB、Activate failure auditing on the access to files and objectsC、Configure all firewalls to track when any packets addresses to FinServ are droppedD、Create an IPSec policy that requires IPSec encryption between FinServ and the firewall
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations. What should you do?()A、Configure dynamic NAT on the firewall.B、Configure the firewall to allow the use of Teredo.C、Configure a link local IPv6 address for the internal interface of the firewall.D、Configure a global IPv6 address for the external interface of the firewall.
Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()A、From Network Connections, right-click the active network connection, and then click Status.B、From Network Connections, select the active network connection, and then click Diagnose this connection.C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.
Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations. What should you do? ()A、Configure dynamic NAT on the firewallB、Configure the firewall to allow the use of TeredoC、Configure a link local IPv6 address for the internal interface of the firewallD、Configure a global IPv6 address for the external interface of the firewall
单选题It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()A single layer of firewallingB multiple layers of firewallingC firewall connections in either an active or standby stateD an architecture in which all traffic between firewalls goes through application-specific servers
单选题You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A From Windows Firewall, add an exceptionB From windows Firewall enable the block all incoming connections optionC From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD From the Windows Firewall with Advanced Security snap-in, create an outbound rule.
单选题Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?()A Layer 3 routing between the Access and Aggregation layers facilities the ability to span VLANsacross multiple access switches, which is a requirement for many server virtualization andclustering technologies.B “East-west” server-to-server traffic can travel between aggregation modules by way of the core,but backup and replication traffic typically remains within an aggregation module.C Load balancing, firewall service, and other network service are commonly integrated by the useof service modules that are inserted in the aggregation switched.D Virtualization tools allow a cost effective approach for redundancy in the network design byusing two or four VDCs from the same physical switch.
单选题You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()A Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B Allow all inbound VPN traffic to pass through the perimeter firewall only.C Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
单选题What is a virtual firewall?()Aanother name for a firewall deployed in routed modeBanother name for a firewall deployed in transparent modeCa separation of multiple firewall security contexts on a single firewallDa firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextEa firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
单选题What is meant by the term "firewall sandwich"?()Amultiple layers of firewallingBa method of operating firewalls from multiple vendorsCfirewall connections in either an active or standby stateDan architecture in which all traffic between firewalls goes through application-specific serversEan architecture in which all traffic between firewalls goes through application-specific gateways