What three key, additional security features do next-generation firewalls provide, that legacy firewalls do not? (Choose three.)
Select one or more:
Web application firewall
Packet-filtering based on IP address
Intrusion prevention system (IPS)
*Application visibility and control
What did early packet filter firewalls do when they detected a packet that did not comply with their rules? (Choose two.)
Select one or more:
Silently dropped the packet
Launched a DDOS attack on the sender’s IP address
*Blocked the packet and sent a message to the sender
Marked the packet as suspect, but continued to send to the destination IP address.
In network security, what is the purpose of a firewall?
Select one:
*To control the flow of network traffic
To limit the number of users on the network
To prevent authorized users from accessing corporate servers
To prevent unauthorized USB devices from being plugged in to a user’s endpoint
What additional functionality did second generation firewalls provide that early packet filter firewalls did not?
Select one:
They looked up the IP address of the sender to determine if the source was on a suspect network.
They examined packet headers to detect if the packet contained viruses.
*They observed network connections over time and continuously examined conversations between endpoints.
They were stateless firewalls that allowed rogue packets that did not belong to an existing connection to pass through the firewall.
What is Fortinet’s range of next-generation firewall devices called?
Select one:
*FortiGate
FortiFirewall
FortiBlocker
FortiGuard
What works closely with FortiGate next-generation firewall products to provide the highest level of network security?
Select one:
NSS Labs
RFCs
*FortiGuard Labs
Gartner
With the explosion of the World Wide Web, the composition of network protocols skewed heavily towards HTTP. What challenge did this shift pose to legacy firewalls?
Select one:
HTTP request methods were too complex and diverse.
Firewalls did not have visibility into HTTP ports.
HTTP was an application layer protocol that relied heavily on TCP.
*Different web applications used the same HTTP port number, making it difficult for firewalls to distinguish between applications
What three key, additional security features do next-generation firewalls provide, that legacy firewalls do not? (Choose three.) Select one or more: Web application firewall Packet-filtering based on IP address Intrusion prevention system (IPS) *Application visibility and control
What did early packet filter firewalls do when they detected a packet that did not comply with their rules? (Choose two.) Select one or more: Silently dropped the packet Launched a DDOS attack on the sender’s IP address *Blocked the packet and sent a message to the sender Marked the packet as suspect, but continued to send to the destination IP address.
In network security, what is the purpose of a firewall? Select one: *To control the flow of network traffic To limit the number of users on the network To prevent authorized users from accessing corporate servers To prevent unauthorized USB devices from being plugged in to a user’s endpoint
What additional functionality did second generation firewalls provide that early packet filter firewalls did not? Select one: They looked up the IP address of the sender to determine if the source was on a suspect network. They examined packet headers to detect if the packet contained viruses. *They observed network connections over time and continuously examined conversations between endpoints. They were stateless firewalls that allowed rogue packets that did not belong to an existing connection to pass through the firewall.
What is Fortinet’s range of next-generation firewall devices called? Select one: *FortiGate FortiFirewall FortiBlocker FortiGuard
What works closely with FortiGate next-generation firewall products to provide the highest level of network security? Select one: NSS Labs RFCs *FortiGuard Labs Gartner
With the explosion of the World Wide Web, the composition of network protocols skewed heavily towards HTTP. What challenge did this shift pose to legacy firewalls? Select one: HTTP request methods were too complex and diverse. Firewalls did not have visibility into HTTP ports. HTTP was an application layer protocol that relied heavily on TCP. *Different web applications used the same HTTP port number, making it difficult for firewalls to distinguish between applications