Deck 7: Working With Proxy Servers and Application-Level Firewalls

Full screen (f)
exit full mode
Question
How should administrators combat buffer overflow?

A) Configure buffers carefully.
B) Update proxy servers frequently.
C) Use only Microsoft products.
D) Limit the use of proxy servers.
Use Space or
up arrow
down arrow
to flip the card.
Question
Virtually all proxy server products scan the ____ of a packet and provide some sort of content-filtering system.

A) destination IP address
B) source IP address
C) header
D) payload
Question
A good alternative to setting up a dedicated proxy server for small businesses is to use a publicly accessible proxy server online.
Question
A network must have one or more proxy servers available for each ____ proxied on the network.

A) packet filter
B) network connection
C) service protocol
D) client computer
Question
Log files can point to ports, machines, or other vulnerable computers through which hackers can gain entry.These entry points are known as ____.

A) screens
B) logged areas
C) intrusions
D) holes
Question
Because a proxy server ____ all packets that pass between the Internet and the internal hosts, attacks that can start with mangled packet data never reach the internal host.

A) drops
B) rebuilds
C) routes
D) reformats
Question
Squid is a full-featured Windows-based firewall that performs access control and filtering and is especially good at quickly serving cached files..
Question
____ is a method of using multiple systems to take turns handling requests, to prevent any one system from getting overloaded.

A) Network load balancing (NLB)
B) Network proxying (NP)
C) Buffer overflow
D) Screen subnets
Question
Blocking URLs is unreliable, mainly because URLs are typically blocked by proxy servers as full-text URLs.
Question
A disk ____ is a predefined temporary data storage location.

A) buffer
B) log
C) cache
D) filter
Question
You can configure a proxy server on a ____ host and install routers that function as packet filters on either side.

A) screened
B) dual-homed
C) internal
D) filtering
Question
The only reason you should place a proxy server directly on the Internet is if the proxy is intended to serve as a transparent proxy.
Question
A ____ firewall combines several different security technologies, such as packet filtering, application-level gateways, and VPNs.

A) dual-homed
B) packet filtering
C) hybrid
D) multi-purpose
Question
____ involves scanning the HTTP host field and directing clients to different Web servers based on the host being requested.

A) URL redirection
B) NAT
C) IP forwarding
D) User authentication
Question
Network administrators ____ to set up the browsers on the network to use a proxy server.

A) must manually configure each client
B) may use a configuration file
C) use a remote management interface
D) use an external publicly accessible proxy
Question
To enhance security, firewall rules can be used along with a proxy server to ____.

A) limit Internet access to only network administrators at all times
B) allow for internal users to bypass the proxy server at all times
C) enable external users to access any client computer directly
D) enable internal users to send outbound requests only at certain times
Question
URLs are blocked on a proxy server as ____.

A) IP addresses
B) full-text URLs
C) screen hosts
D) domains
Question
How should organizations cope with proxy server slowdown?

A) Use a different proxy server product.
B) Add multiple proxy servers to the same network connection.
C) Add multiple network connections for the same proxy server.
D) Buy additional hardware.
Question
As the number of users on the network grows, the machine that hosts the proxy server should be upgraded.
Question
Proxy servers perform operations on ____-level data.

A) application
B) header
C) data link
D) transport
Question
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Defined pieces of packet or system data
Question
Microsoft ____________________ is a complex, full-featured firewall that includes stateful packet filtering as well as proxy services, NAT, and intrusion detection.
Question
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Evaluate the application-layer data buried in the data portion of an IP packet to determine whether to allow the packet to pass into or out of the network.
Question
____, a Symantec product, offers a number of residential firewall and security applications that also provide various degrees of content filtering and proxy services.

A) Norton
B) WinGate
C) Squid
D) Internet Security & Acceleration Server
Question
____ has a graphical interface that enables you to quickly configure applications to use SOCKS.

A) ISA
B) Squid
C) WinGate
D) SocksCap
Question
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Computer that has two separate network interfaces, one to the external Internet and one to the internal LAN.
Question
It is good practice to dedicate a proxy server to one ____________________.
Question
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Scan specific parts of the data portion of an HTTP packet and redirect it to a specific location.
Question
Proxy servers, like packet filters, can filter out content based on rules that contain a variety of ____________________.
Question
A reverse proxy acts as a stand-in for a ____.

A) packet filter
B) firewall
C) proxy server
D) Web-server
Question
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Maintain records of events such as logon attempts and accesses to files.
Question
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Also called explicit proxies.
Question
A proxy server rebuilds packets with new ____________________ IP information, which shields internal users from those on the outside.
Question
A ____ is also an identifier consisting of an IP address and port number, such as 172.16.0.1:80.

A) socket
B) route
C) domain name
D) URL
Question
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Configured so that they are totally invisible to end users.
Question
NetPatrol is ____.

A) an antivirus plug-in for WinGate
B) an intrusion detection and prevention system that can be integrated with WinGate
C) an IP-tunnel remote access application
D) a Web content classification plug-in for WinGate
Question
A ____ is a service that acts as a proxy for inbound connections.

A) hybrid firewall
B) nontransparent proxy
C) transparent proxy
D) reverse proxy
Question
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Set of protocols that enable proxy server access to applications without an assigned proxy server.
Question
Buffer ____________________ occurs when a program attempts to store more data in a temporary storage area (a buffer) than that area can hold.
Question
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
A very popular proxy server for home and small business environments.
Question
Describe the pros and cons of blocking URLs with a proxy server.
Question
How can proxy servers affect performance of the network?
Question
In a typical transaction, a proxy server intercepts a request from a user on the internal network and passes it along to a destination computer on the Internet.What steps are involved in this process?
Question
What should proxy server administrators consider when configuring proxy servers for various services?
Question
What is SOCKS?
Question
How do proxy server log files help protect the network?
Question
What is the most important benefit of a proxy server?
Question
How do proxy servers differ from packet filters?
Question
How do reverse proxy servers work?
Question
How can a proxy server be used for e-mail protection?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Working With Proxy Servers and Application-Level Firewalls
1
How should administrators combat buffer overflow?

A) Configure buffers carefully.
B) Update proxy servers frequently.
C) Use only Microsoft products.
D) Limit the use of proxy servers.
B
2
Virtually all proxy server products scan the ____ of a packet and provide some sort of content-filtering system.

A) destination IP address
B) source IP address
C) header
D) payload
D
3
A good alternative to setting up a dedicated proxy server for small businesses is to use a publicly accessible proxy server online.
False
4
A network must have one or more proxy servers available for each ____ proxied on the network.

A) packet filter
B) network connection
C) service protocol
D) client computer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Log files can point to ports, machines, or other vulnerable computers through which hackers can gain entry.These entry points are known as ____.

A) screens
B) logged areas
C) intrusions
D) holes
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Because a proxy server ____ all packets that pass between the Internet and the internal hosts, attacks that can start with mangled packet data never reach the internal host.

A) drops
B) rebuilds
C) routes
D) reformats
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Squid is a full-featured Windows-based firewall that performs access control and filtering and is especially good at quickly serving cached files..
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
____ is a method of using multiple systems to take turns handling requests, to prevent any one system from getting overloaded.

A) Network load balancing (NLB)
B) Network proxying (NP)
C) Buffer overflow
D) Screen subnets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Blocking URLs is unreliable, mainly because URLs are typically blocked by proxy servers as full-text URLs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
A disk ____ is a predefined temporary data storage location.

A) buffer
B) log
C) cache
D) filter
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
You can configure a proxy server on a ____ host and install routers that function as packet filters on either side.

A) screened
B) dual-homed
C) internal
D) filtering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The only reason you should place a proxy server directly on the Internet is if the proxy is intended to serve as a transparent proxy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
A ____ firewall combines several different security technologies, such as packet filtering, application-level gateways, and VPNs.

A) dual-homed
B) packet filtering
C) hybrid
D) multi-purpose
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
____ involves scanning the HTTP host field and directing clients to different Web servers based on the host being requested.

A) URL redirection
B) NAT
C) IP forwarding
D) User authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Network administrators ____ to set up the browsers on the network to use a proxy server.

A) must manually configure each client
B) may use a configuration file
C) use a remote management interface
D) use an external publicly accessible proxy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
To enhance security, firewall rules can be used along with a proxy server to ____.

A) limit Internet access to only network administrators at all times
B) allow for internal users to bypass the proxy server at all times
C) enable external users to access any client computer directly
D) enable internal users to send outbound requests only at certain times
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
URLs are blocked on a proxy server as ____.

A) IP addresses
B) full-text URLs
C) screen hosts
D) domains
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
How should organizations cope with proxy server slowdown?

A) Use a different proxy server product.
B) Add multiple proxy servers to the same network connection.
C) Add multiple network connections for the same proxy server.
D) Buy additional hardware.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
As the number of users on the network grows, the machine that hosts the proxy server should be upgraded.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Proxy servers perform operations on ____-level data.

A) application
B) header
C) data link
D) transport
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Defined pieces of packet or system data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Microsoft ____________________ is a complex, full-featured firewall that includes stateful packet filtering as well as proxy services, NAT, and intrusion detection.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Evaluate the application-layer data buried in the data portion of an IP packet to determine whether to allow the packet to pass into or out of the network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
____, a Symantec product, offers a number of residential firewall and security applications that also provide various degrees of content filtering and proxy services.

A) Norton
B) WinGate
C) Squid
D) Internet Security & Acceleration Server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
____ has a graphical interface that enables you to quickly configure applications to use SOCKS.

A) ISA
B) Squid
C) WinGate
D) SocksCap
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Computer that has two separate network interfaces, one to the external Internet and one to the internal LAN.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
It is good practice to dedicate a proxy server to one ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Scan specific parts of the data portion of an HTTP packet and redirect it to a specific location.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Proxy servers, like packet filters, can filter out content based on rules that contain a variety of ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A reverse proxy acts as a stand-in for a ____.

A) packet filter
B) firewall
C) proxy server
D) Web-server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Maintain records of events such as logon attempts and accesses to files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Also called explicit proxies.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
A proxy server rebuilds packets with new ____________________ IP information, which shields internal users from those on the outside.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A ____ is also an identifier consisting of an IP address and port number, such as 172.16.0.1:80.

A) socket
B) route
C) domain name
D) URL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Configured so that they are totally invisible to end users.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
NetPatrol is ____.

A) an antivirus plug-in for WinGate
B) an intrusion detection and prevention system that can be integrated with WinGate
C) an IP-tunnel remote access application
D) a Web content classification plug-in for WinGate
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A ____ is a service that acts as a proxy for inbound connections.

A) hybrid firewall
B) nontransparent proxy
C) transparent proxy
D) reverse proxy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
Set of protocols that enable proxy server access to applications without an assigned proxy server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Buffer ____________________ occurs when a program attempts to store more data in a temporary storage area (a buffer) than that area can hold.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match each item with a statement below.
a.dual-homed host
b.URL redirection
c.nontransparent proxies
f.SOCKS
g.WinGate
h.proxy servers
A very popular proxy server for home and small business environments.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the pros and cons of blocking URLs with a proxy server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
How can proxy servers affect performance of the network?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
In a typical transaction, a proxy server intercepts a request from a user on the internal network and passes it along to a destination computer on the Internet.What steps are involved in this process?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What should proxy server administrators consider when configuring proxy servers for various services?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is SOCKS?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
How do proxy server log files help protect the network?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is the most important benefit of a proxy server?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
How do proxy servers differ from packet filters?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
How do reverse proxy servers work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
How can a proxy server be used for e-mail protection?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.