CASP lesson 4 Flashcards
forward traffic between subnets by inspecting IP addresses and so
operate at layer 3 of the OSI model.
routers
a special purpose device, or appliance, containing
specialized software allowing the configuration of traffic management rules.
load balancer
attacks attempt to disrupt the normal flow of traffic
of a server or service by overwhelming the target with traffic.
Distributed Denial-of-Service (DDoS)
can be used to reduce the amount of throughput available to the
server or service being attacked. This approach protects the attack from consuming
all available bandwidth and impacting other servers and services on the network.
Rate Limiting
provides effective protection of web applications
by inspecting traffic for signs of malicious activity through the use of sophisticated
rules designed to identify attacks such as CSRF, XSS, SQLi, and many others, and
prevents these attacks from reaching the target.
Web Application Firewall (WAF)
provides effective protection of web applications
by inspecting traffic for signs of malicious activity through the use of sophisticated
rules designed to identify attacks such as CSRF, XSS, SQLi, and many others, and
prevents these attacks from reaching the target.
Web Application Firewall (WAF)
essentially takes all the traffic
intended for an endpoint and essentially drops it. This approach drops both
legitimate and malicious traffic.
Blackhole Routing
provide DDoS protection as a service and using this
approach requires updating DNS to point traffic to the service provider in order for
it to be inspected prior to it reaching the intended service.
Cloud Service Providers
provides special purpose devices and
software designed to identify and protect against this type of attack.
DDoS Mitigation Software/Appliance
a device or virtual appliance
which provides multiple security services in a single solution
unified threat management (UTM)
Type of proxy provides for protocol-specific outbound traffic.
forward proxy
The main benefit of a _____ is that client computers connect to a specified point
on the perimeter network for web access.
proxy
A _______________ proxy means that the client must be configured with the
proxy server address and port number to use it. The port on which the proxy
server accepts client connections is often configured as port 8080.
non-transparent
A_______________proxy (or forced or intercepting) intercepts client traffic without
the client having to be reconfigured. A transparent proxy must be implemented
on a switch or router or other in-line network appliance.
transparent
A ___________ script allows a client to configure proxy settings without
user intervention. The ____________ protocol allows browsers to
locate a PAC file.
proxy autoconfiguration (PAC); Web Proxy Autodiscovery (WPAD)