Chapter 9 Test – Computer Security4e
Chapter 9 Test – Computer Security4e
TRUE/FALSE QUESTIONS:
T F 3. The firewall can protect against attacks that bypass the firewall.
T F 10. A DMZ is one of the internal firewalls protecting the bulk of the
enterprise network.
1. _________ control determines the types of Internet services that can be accessed,
inbound or outbound.
A. Behavior B. Direction
C. Service D. User
3. _________ control determines the direction in which particular service requests may
be initiated and allowed to flow through the firewall.
A. Behavior B. User
C. Direction D. Service
6. A __________ gateway sets up two TCP connections, one between itself and a TCP
user on an inner host and one between itself and a TCP user on an outside host.
A. packet filtering B. stateful inspection
C. application-level D. circuit-level
Computer Security: Principles and Practice, 4th Edition Chapter 9
8. Typically the systems in the _________ require or foster external connectivity such as
a corporate Web site, an e-mail server, or a DNS server.
A. DMZ B. IP protocol field
C. boundary firewall D. VPN
11. Typical for SOHO applications, a __________ is a single router between internal and
external networks with stateless or full packet filtering.
A. single bastion T B. double bastion inline
C. screening router D. host-resident firewall
12. __________ are attacks that attempt to give ordinary users root access.
A. Privilege-escalation exploits B. Directory transversals
C. File system access D. Modification of system resources
Computer Security: Principles and Practice, 4th Edition Chapter 9
13. __________ scans for attack signatures in the context of a traffic stream rather than
individual packets.
A. Pattern matching B. Protocol anomaly
C. Traffic anomaly D. Stateful matching
14. __________ looks for deviation from standards set forth in RFCs.
A. Statistical anomaly B. Protocol anomaly
C. Pattern matching D. Traffic anomaly
15. The _________ attack is designed to circumvent filtering rules that depend on TCP
header information.
A. tiny fragment B. address spoofing
C. source routing D. bastion host
1. The _________ is inserted between the premises network and the Internet to
establish a controlled link and to erect an outer security wall or perimeter to
protect the premises network from Internet-based attacks.
4. An intruder transmitting packets from the outside with a source IP address field
containing an address of an internal host is known as IP address _________.
10. A ___________ makes use of both signature and anomaly detection techniques to
identify attacks.
11. _________ matching scans incoming packets for specific byte sequences (the
signature) stored in a database of known attacks.
12. __________ anomaly watches for unusual traffic activities, such as a flood of
UDP packets or a new service appearing on the network.
13. Snort Inline adds three new rule types: drop, reject, and _________.
14. A single device that integrates a variety of approaches to dealing with network-
based attacks is referred to as a __________ system.
15. The firewall follows the classic military doctrine of _________ because it
provides an additional layer of defense.