4.5 Firewalls Flashcards

(32 cards)

1
Q

What is a network-based firewall?

A

An appliance that sits inline in your network and makes decisions about whether traffic should be allowed or disallowed through the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two main types of firewalls mentioned?

A
  • Traditional firewall
  • Next-generation firewall (NGFW)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What additional services can a firewall provide beyond security?

A
  • VPN endpoints
  • VPN concentrators
  • Routing functions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a next-generation firewall (NGFW) do?

A

Analyzes traffic and recognizes specific applications to make decisions about allowing or disallowing traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: Traditional firewalls only make decisions based on port numbers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an application layer gateway?

A

Another term for a next-generation firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is packet capturing?

A

The process of intercepting and logging traffic that passes through the firewall for analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fill in the blank: A next-generation firewall can allow or disallow _______ server traffic.

A

web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the term ‘implicit deny’ refer to in firewall rules?

A

All traffic that does not match any specific rule is automatically denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Access Control List (ACL)?

A

A list of rules that determine what traffic is allowed or denied through a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of an Intrusion Prevention System (IPS)?

A

To monitor traffic in real time and recognize malicious software using signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does an IPS identify threats without specific signatures?

A

By looking for anomalies that indicate a potential intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of traffic does the Conficker worm signature target?

A

Specific types of traffic associated with the Conficker worm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some common protocols mentioned for firewall rules?

A
  • TCP
  • UDP
  • ICMP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: Microsoft Remote Desktop Protocol uses TCP port _______.

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the function of network address translation in firewalls?

A

To modify the IP address information in the IP header of packets while they are in transit.

17
Q

What is the significance of placing specific rules at the top of a firewall rule base?

A

To quickly recognize and apply the most specific rules.

18
Q

What happens if a firewall rule allows traffic from any remote IP address to a local port number of 80?

A

HTTP traffic is allowed.

19
Q

What type of traffic is allowed through port 53?

20
Q

What is ICMP commonly associated with?

A

Ping operations.

21
Q

Fill in the blank: An IPS can block traffic based on _______ vulnerabilities.

22
Q

What is a common issue with IPS rules?

A

False positives.

23
Q

What is a screened subnet?

A

A subnet that holds services and devices accessible by individuals on the internet, separate from sensitive data.

24
Q

What is the primary role of a firewall in a network?

A

To control the ingress and egress of traffic between the internal network and the internet.

25
True or False: The next-generation firewall does not require packet analysis.
False
26
What is one challenge of having many rules in an IPS?
Managing false positives while maintaining security.
27
What does the term 'signature' refer to in the context of an IPS?
A predefined pattern used to identify specific types of malicious traffic.
28
What is a common issue found in an IPS?
False positives ## Footnote False positives occur when legitimate traffic is mistakenly identified as malicious.
29
What can be customized in an IPS to improve security?
Rules ## Footnote Customizing rules helps balance security and the identification of false positives.
30
What type of rules might you find in an IPS?
Rules based on malware ## Footnote These rules often involve specific port numbers and malware names.
31
What is an example of a protocol that may have specific rules in an IPS?
FTP protocol ## Footnote The FTP protocol can have rules to identify worms during the login process.
32
How can an IPS be configured regarding worms in the FTP login process?
To identify and block them ## Footnote This configuration prevents the worm from entering the network.