8 Flashcards

1
Q

Firewall features:

A
  • All traffic must pass through the firewall
  • Traffic only passes if it abides by the firewall’s policy
  • Can’t be penetrated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Characteristics of firewall access policy:

A
  • IP address and protocol values
  • Application protocol
  • User identity
  • Network activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Packet filtering firewall policies:

A
  • Discard
  • Forward
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet Filter Weaknesses:

A
  • Limited logging
  • Vulnerable to protocol bugs
  • Vulnerable to application bugs
  • No user authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Packet Filter Attacks:

A
  • IP address spoofing
  • Source route attacks
  • Tiny fragment attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Locations of circuit-level gateway TCP connections:

A
  • One between itself and a TCP user on an inner host
  • One on an outside host
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SOCKS:

A

Framework that enables the use of a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SOCKS components:

A
  • SOCKS server on the firewall
  • SOCKS client library on all internal hosts
  • SOCKS-ified client applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewall locations:

A
  • Bastion host
  • Host-based
  • Personal firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bastion Host Common characteristics:

A
  • Secure
  • Authentication
  • Many proxies
  • Small proxies
  • Independent proxies
  • Proxies can restrict access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Host-based advantages:

A
  • Made for hosts
  • Protection against internal and external threats
  • Works as an additional layer of protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firewall Topologies:

A
  • Host-resident
  • Screening router
  • Single bastion inline
  • Single bastion T
  • Double bastion inline
  • Double bastion T
  • Distributed firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Host-resident firewall:

A

Personal firewall + firewall on server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Screening router:

A

Router between internal and external network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Single bastion inline:

A

Firewall between internal and external router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Distributed firewalls:

A

Combination of firewalls on 100s if PCs under one admin

17
Q

Firewall capabilities:

A
  • Single choke point
  • Monitoring security events
18
Q

Firewall limits:

A
  • Cannot protect against attacks bypassing firewall
  • Devices infected outside then used inside
19
Q

Host-based IPS identifies attacks using:

A
  • Signature techniques
  • Anomaly detection
20
Q

Network-based IPS identifies attacks using:

A
  • Pattern matching
  • Stateful matching
  • Protocol anomaly
  • Traffic anomaly
21
Q

Snort inline new rule types:

A
  • Reject (Sdrop)
  • Reject and log (Drop)
  • Reject, log, and return error (Reject)