which of the following is not a major processing-mode category for firewalls?

# which of the following is not a major processing-mode category for firewalls?

S
9.9k points
The application gateway is also known as a(n) __________.application-level firewall
A(n) __________ is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.VPN
Known as the ping service, ICMP is a(n) __________ and should be ___________.common method for hacker reconnaissance, turned off to prevent snooping
In __________ mode, the data within an IP packet is encrypted, but the header information is not.transport
__________ inspection firewalls keep track of each network connection between internal and external systems.Stateful
__________ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.Packet-filtering
__________ and TACACS are systems that authenticate the credentials of users who are trying to access an organizations network via a dial-up connection.RADIUS
Telnet protocol packets usually go to TCP port __________ whereas SMTP packets go to port __________.23, 25
Which of the following version of TACACS is still in use?TACACS+
__________ is the protocol for handling TCP traffic through a proxy server.SOCKS
Since the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the __________ host.DMZ
Which of the following is not a major processing-mode category for firewalls?Router Passthru
The dominant architecture used to secure network access today is the __________ firewall.screened subnet
The __________ is an intermediate area between a trusted network and an untrusted networkDMZ
In most common implementation models, the content filter has two components: __________.rating and filtering
The proxy server is often placed in an unsecured area of the network or is placed in the __________ zone.demilitarized
A __________ filtering firewall can react to an emergent event and update or create rules to deal with the event.dynamic
The primary benefit of a VPN that uses _________ is that an intercepted packet reveals nothing about the true destination system.tunnel mode
The service within Kerberos that generates and issues session keys is known as __________.KDC
The restrictions most commonly implemented in packet-filtering firewalls are based on __________.All of the above
which of
studybud

Surround your text in *italics* or **bold**, to write a math equation use, for example, $x^2+2x+1=0$ or $$\beta^2-1=0$$

Use LaTeX to type formulas and markdown to format text. See example.