Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Knowledge Assessment  Lesson 11 Multiple Choice Select one or more correct answers for each of the following questions

Knowledge Assessment  Lesson 11 Multiple Choice Select one or more correct answers for each of the following questions

Computer Science

Knowledge Assessment  Lesson 11

Multiple Choice

Select one or more correct answers for each of the following questions.

1)       Which of the following mechanisms is used most often used in firewall rules to allow traffic onto the network?

a.       Protocol numbers

b.       IP addresses

c.        Port numbers

d.       Hardware addresses

2.       Which of the following actions can you NOT perform from the Windows Firewall control panel? (Choose all that apply.)

a.       Turn Windows firewall off for all three profiles.

b.       Manage firewall exceptions for the domain profile.

c.        Allow a program through the firewall in all three profiles.

d.       Create firewall exceptions based on port numbers.

3.       Connection security rules require that network traffic allowed through the firewall use which of the following security mechanisms?

a.       IPsec

b.       EFS

c.        UAC

d.       PIV

4.       Windows Firewall uses three profiles to represent the type of network to which the server is connected. What are the three profiles?

a.       Private, Temporary, and Authenticated

b.       Public, DMZ, and Private

c.        Internet, Secure, and Private

d.       Domain, Private, and Public

5.       When a user attempts to visit an Internet-based web server, what is the default action of the Windows Firewall?

a.       The firewall will not permit the user to visit a non-corporate website.

b.       The firewall by default will not block client-initiated network traffic.

c.        The firewall will block the web request unless the user is already authenticated.

d.       The firewall will block all outbound traffic.

6.       In the Windows Firewall with Advanced Security console, while creating a new rule, the Program page specifies whether the ______.

a.       rule applies to all programs, to one specific program

b.       rule applies to all users, to one specific user

c.        rule applies to all systems, to one specific system

d.       rule applies to all programs, to one specific program, or to a specific service

7.       By exporting the Windows Firewall policy, you have a file with a .wfw extension that contains _____.

a.       all the rules you have created or modified

b.       preconfigured rules to be applied to another firewall

c.        all its rules, including the preconfigured rules and the ones you have created or modified

d.       firewall settings as specified by the Group Policy settings

Best Answer

Choose the letter that corresponds to the best answer. More than one answer choice may achieve the goal. Select the BEST answer.

1.       What is the primary objective of a firewall?

a.       To permit traffic in and out for legitimate users, and to block the rest

b.       To authenticate and authorize users past the network perimeter

c.        To compare traffic information against a list of known valid traffic

d.       To protect a network by allowing certain types of network traffic in and out of the system

2.       Windows Firewall Customize Settings contains three profiles (Public, Private, and Domain). What differentiates these profiles from each other?

a.       Public is for servers accessible to temporary users. Private is for servers on an internal network. Domain is for servers in which users are all authenticated.

b.       Public is for servers accessible to unauthenticated users. Private is for inaccessible servers. Domain is for servers accessible only to authenticated users.

c.        Public is for servers accessible to temporary users. Private is for servers on an internal network. Domain is for servers across multiple sites.

d.       Public is for servers accessible to unauthenticated users. Private is for servers on a private network. Domain is for servers spanning different domain groups.

3.       Windows Firewall allows you to create inbound, outbound, and connection security rules for individual servers or systems. How can you do this for multiple systems?

a.       You can delegate to administrators the task of performing the same configuration to their local servers.

b.       You can create a new Group Policy object (GPO) and create matching rules to match the desired configuration. Then deploy the GPO to other systems on the network.

c.        You can visit individual systems and configure them as you have the initial system.

d.       You can create a new GPO and you can import settings from a policy file created earlier. Then deploy the GPO to other systems on the network.

4.       What is the primary benefit of configuring Windows Firewall through the Windows Firewall with Advanced Security snap-in for the Microsoft Management Console?

a.       The Microsoft Management Console offers a more familiar interface than the Windows Firewall control panel.

b.       The Microsoft Management Console snap-in applies the rules faster than the Windows Firewall control panel.

c.        Compared to the Windows Firewall control panel, the Microsoft Management Console can be brought up in fewer clicks.

d.       The Microsoft Management Console snap-in offers full access compared to the Windows Firewall control panel.

5.       When creating a firewall exception, what is the difference between opening a port and allowing an application?

a.       Opening a port is permanent, and thus is less risky than allowing an application.

b.       Allowing an application opens the specified port only while the program is running, and thus is less risky.

c.        Both options are available in the Windows Firewall with Advanced Security console.

d.       There is no functional difference between opening a port and allowing an application.

Build a List

Choose the letter that corresponds to the best answer. More than one answer choice may achieve the goal. Select the BEST answer.

1.       Specify the order of steps for processing an application in Windows Firewall.

           Click Allow an app or feature through Windows Firewall. The Allowed Apps dialog box appears.  

           Scroll down in the Allowed apps and features list and select the check box for the application you want to allow through the firewall.

           Log on to Windows 8, using an account with administrator privileges.

           Click OK to close the Allowed Apps dialog box.

           Open the Control Panel and click System and Security > Windows Firewall. The Windows Firewall window appears.

2.       In order of first to last, specify the order of steps for creating Windows Firewall rules.

           From the Action menu, select Export Policy. The Save As combo box appears.

           Log on to Windows 8, using an account with administrator privileges.

           Modify the inbound or outbound firewall rules or create new rules as needed.

           Open the Control Panel and select System & Security > Administrative Tools > Windows Firewall with Advanced Security. The Windows Firewall with Advanced Security console appears.

           In the left pane, select the Windows Firewall with Advanced Security on Local Computer node.

           In the File Name text box, type a name for the policy file and click Save.

Business Case Scenarios

Scenario 11-1: Configuring Windows Firewall

           You are a desktop technician in the IT department of a small corporation. Today is the day of the company picnic and, as the junior member of the department, you have been left in charge of the entire corporate network while everyone else is out of the office. Shortly after 2:00 PM, an email arrives from the company’s biggest customer, complaining that they can’t access the web server they use to place their orders. After checking the web server logs, it seems clear that the server is undergoing a denial-of-service attack, because there are suddenly hundreds of Internet computers repeatedly trying to access it. What temporary modifications could you make to Windows Firewall on the Windows 8 computer that stands between the web server and the Internet that would allow customers to access the web server while blocking the attackers?

          

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE