22.2.5 Check Your Understanding – Identify the Host-Based Intrusion Protection Terminology Answers

1. What allows Linux system administrators to configure network access rules that are part of the Linux kernel Netfilter modules?

  • Policy-based strategy
  • nftables
  • iptables
  • Windows Firewall
  • Windows Defender Firewall

Explanation: iptables allows Linux system administrators to configure network access rules that are part of the Linux kernel Netfilter modules.

2. Which of the following uses a profile-based approach to configuring firewall functionality?

  • iptables
  • Windows firewall
  • Policy-based strategy
  • TCP wrappers
  • Anomaly-based strategy

Explanation: Windows Firewall uses a profile-based approach to configuring firewall functionality.

3. Which of the following is a rule-based control and logging system for Linux?

  • TCP wrappers
  • iptables
  • nftables
  • Anomaly-based strategy
  • Windows Firewall

Explanation: TCP Wrappers is a rule-based control and logging system for Linux.

4. Which of the following uses a learned baseline model?

  • iptables
  • policy-based strategy
  • TCP wrapper
  • Windows Defender
  • Anomaly-based strategy

Explanation: Anomaly-based strategy uses a learned baseline model of normal behavior.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x