3.2: Internet communication security countermeasures Flashcards

1
Q

firewalls

A

Firewalls are devices that control the flow of messages between networks. Placed at the boundary between the Internet and an organization’s internal network, firewalls enforce a security policy by prohibiting all inbound traffic except for the specific few types of traffic that are permitted to a select few systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of firewall

A
  • Screening routers
  • Stateful inspection firewall
  • Application firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Screening routers

A

• Screening routers These simpler firewalls are designed to examine each packet and compare it to an access control list (ACL) to determine whether, based on its source and destination IP addresses and ports, it should be permitted to pass through the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stateful inspection firewall

A

Designed to record incoming packets and keep track of TCP/IP sessions between external and internal.

Stateful inspection firewalls are more complex and capable of more effectively protecting an organization’s network.hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens to packet in the TCP protocol

A

In the TCP protocol, an incoming packet is answered with an outgoing packet and make a go/no-go decision based on whether it believes that the outgoing packet is part of an active session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application firewall

A

Application firewalls are devices that are designed to protect web-based applications from application layer attacks.
Application firewalls are designed to block application layer attacks, but not necessarily act as a general-purpose firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DMZ

A

a separate network where Internet-facing systems are attached and isolated with one or more firewalls.

The rules in the firewall(s) will permit specific services from the Internet to reach the DMZ servers, but will not permit access from the Internet to the internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Honeypot

A

A honeypot is a trap that is designed to detect unauthorized use of information systems.

A honeypot will have the appearance of a system containing important information and of being unprotected and unmonitored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Honeynets

A

A network of computers that are all acting as honeypots to emulate a complex production environment that consists of several computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly