A critical function of a firewall is to act as a:
A. special router that connects the Internet to a LAN.
B. device for preventing authorized users from accessing the
LAN.
C. server used to connect authorized users to private
trusted network resources.
D. proxy server to increase the speed of access to
authorized users.
Answers were Sorted based on User's Feedback
Answer / s. radhakrishnan
Answers: C
The critical function of the firewall is to aloow users
from the internal network to outside network and block all
unauthorised access from outside network.
Is This Answer Correct ? | 19 Yes | 4 No |
Answer / guest
Answer: B
A firewall is a set of related programs, located at a
network gateway server, that protects the resources of a
private network from users of other networks. An enterprise
with an intranet that allows its workers access to the wider
Internet installs a firewall to prevent outsiders from
accessing its own private data resources and for controlling
the outside resources to which its own users have access.
Basically, a firewall, working closely with a router
program, filters all network packets to determine whether or
not to forward them toward their destination. A firewall
includes or works with a proxy server that makes network
requests on behalf of workstation users. A firewall is often
installed in a specially designated computer separate from
the rest of the network so no incoming request can get
directed to private network resources.
Is This Answer Correct ? | 5 Yes | 10 No |
Which of the following would be of the LEAST value to an IS auditor attempting to gain an understanding of an organization's IT process? A. IT planning documents with deliverables and performance results B. Policies and procedures relating to planning, managing, monitoring and reporting on performance C. Prior audit reports D. Reports of IT functional activities
To review access to ceratin data base to determine whether the "new user" forms were correctly authorized. This is an example of:
The primary goal of a web site certificate is: A. authentication of the web site to be surfed through. B. authentication of the user who surfs through that site. C. preventing surfing of the web site by hackers. D. the same purpose as that of a digital certificate.
When implementing continuous monitoring systems an IS auditor's first step is to identify: A. reasonable target thresholds. B. high-risk areas within the organization. C. the location and format of output files. D. applications that provide the highest potential payback.
Which of the following would BEST support 24/7 availability? A. Daily backup B. Offsite storage C. Mirroring D. Periodic testing
The extent to which data will be collected during an IS audit should be determined, based on the: A. availability of critical and required information. B. auditor's familiarity with the circumstances. C. auditee's ability to find relevant evidence. D. purpose and scope of the audit being done.
The general ledger setup function in an enterprise resource package (ERP) allows for setting accounting periods. Access to this function has been permitted to users in finance, the warehouse and order entry. The MOST likely reason for such broad access is the: A. need to change accounting periods on a regular basis.. B. requirement to post entries for a closed accounting period. C. lack of policies and procedures for the proper segregation of duties. D. need to create/modify the chart of accounts and its allocations.
In a client-server architecture, a domain name service (DNS) is MOST important because it provides the: A. address of the domain server. B. resolution service for the name/address. C. IP addresses for the Internet. D. domain name system.
Electronic signatures can prevent messages from being: A. suppressed. B. repudiated. C. disclosed. D. copied.
Which of the following functions is performed by a virtual private network (VPN)? A. Hiding information from sniffers on the net B. Enforcing security policies C. Detecting misuse or mistakes D. Regulating access
Which of the following reports is a measure of telecommunication transmissions and determines whether transmissions are completed accurately? A. Online monitor reports B. Downtime reports C. Help desk reports D. Response time reports
Which of the following should be in place to protect the purchaser of an application package in the event that the vendor ceases to trade? A. Source code held in escrow. B. Object code held by a trusted third party. C. Contractual obligation for software maintenance. D. Adequate training for internal programming staff.