What is a network-based firewall?
An appliance that sits inline in your network and makes decisions about whether traffic should be allowed or disallowed through the firewall.
What are the two main types of firewalls mentioned?
What additional services can a firewall provide beyond security?
What does a next-generation firewall (NGFW) do?
Analyzes traffic and recognizes specific applications to make decisions about allowing or disallowing traffic.
True or False: Traditional firewalls only make decisions based on port numbers.
True
What is an application layer gateway?
Another term for a next-generation firewall.
What is packet capturing?
The process of intercepting and logging traffic that passes through the firewall for analysis.
Fill in the blank: A next-generation firewall can allow or disallow _______ server traffic.
web
What does the term ‘implicit deny’ refer to in firewall rules?
All traffic that does not match any specific rule is automatically denied.
What is an Access Control List (ACL)?
A list of rules that determine what traffic is allowed or denied through a firewall.
What is the purpose of an Intrusion Prevention System (IPS)?
To monitor traffic in real time and recognize malicious software using signatures.
How does an IPS identify threats without specific signatures?
By looking for anomalies that indicate a potential intrusion.
What type of traffic does the Conficker worm signature target?
Specific types of traffic associated with the Conficker worm.
What are some common protocols mentioned for firewall rules?
Fill in the blank: Microsoft Remote Desktop Protocol uses TCP port _______.
3389
What is the function of network address translation in firewalls?
To modify the IP address information in the IP header of packets while they are in transit.
What is the significance of placing specific rules at the top of a firewall rule base?
To quickly recognize and apply the most specific rules.
What happens if a firewall rule allows traffic from any remote IP address to a local port number of 80?
HTTP traffic is allowed.
What type of traffic is allowed through port 53?
DNS traffic.
What is ICMP commonly associated with?
Ping operations.
Fill in the blank: An IPS can block traffic based on _______ vulnerabilities.
known
What is a common issue with IPS rules?
False positives.
What is a screened subnet?
A subnet that holds services and devices accessible by individuals on the internet, separate from sensitive data.
What is the primary role of a firewall in a network?
To control the ingress and egress of traffic between the internal network and the internet.