Firewall
A n_____ s_______ d_____ that monitors t______ to and from your network
network security device; traffic;
Port filtering
A f______ function that b____ or a_____ certain port numbers to limit u_______ c___________
firewall; blocks; allows; unwanted communication;
Cloud-based firewalls
S______ f________ that are hosted by a c_____ s_______ p_______
Software firewalls; cloud service provider;
Stateful
A class of f______ that keeps track of i_________ passing through it and proactively f_____ out t______
firewall; information; filters; threats;
Stateless
A class of f_____ that operates based on p_________ rules and does not keep track of information from d___ p______
firewall; predefined; data packets;
Benefits of Next Generation Firewalls (NGFWs)
- D___ p_____ inspection
- I________ p________
- T_____ i_________
Deep packet;
Intrusion protection;
Threat intelligence;
Virtual Private Network (VPN)
A n______ s______ s______ that changes your p_____ _ _ address and hides your v_____ location so that you can keep your d___ private when you are using a p____ network like the i______
network security service; public IP; virtual; data; public; internet;
Encapsulation
A process performed by a _ _ _ service that protects your data by wrapping s________ d___ in other d___ p______
VPN; sensitive data; data packets;
Security zone
A segment of a n______ that p_____ the internal n______ from the i_______
network; protects; network; internet;
Network segmentation
A s______ technique that d_____ the n______ into segments
security; divides; network;
Uncontrolled zone
Any n______ outside of the o__________’s control
network; organization;
Controlled zone
A subnet that protects the i______ n______ from the u__________ zone
internal network; uncontrolled;
Areas in the controlled zone
- D____________ zone (DMZ)
- I______ network
- R________ zone
Demilitarized;
Internal;
Restricted;
Subnetting
network; subnets;
address range; subnets; network;
subnets; IP; mask; devices;
Classless Inter-Domain Routing (CIDR)
subnet masks; IP; subnet;
Classless; classful;
classful; chunks;
Security benefits of subnetting
network; network; IP;
network bandwidth; network performance;
Proxy server
A s_____ that fulfils the requests of a c_____ by forwarding them to other s_____
server; client; servers;
Forward proxy server
R________ and r_____ a person’s a_____ to the internet
Regulates; restricts; access;
Reverse proxy server
R_______ and r_____ the internet’s access to an i______ server
Regulates; restricts; internal;
Network protocols:
1) C___________ protocols: Used to establish c__________ between s______
2) M__________ protocols: Used to troubleshoot n_______ i_____
3) S_______ protocols provide e_________ for data in t_____
Communication; connections; servers;
Management; network issues;
Security; encryption; transit;
IPSec is commonly used in s___-t_-s___ VPNs to create an e________ t_____ between the p______ network and the r_____ network.
site-to-site; encrypted tunnel; primary; remote;
One disadvantage of site-to-site VPNs is how c______ they can be to c______ and m_____ compared to r_____ VPNs
complex; configure; manage; remote;
Choosing between IPSec and WireGuard depends on many factors, including:
- C________ s______
- C__________ with existing n______ i___________
- B______ or i___________ needs
Connection speeds;
Compatibility; network infrastructure;
Business; individual;
WireGuard VPN
high-speed; advanced encryption; protect; internet;
simple; maintain;
site-to-site; client-server;
open source; deploy; debug;