ch 7Network Perimeter Security Flashcards

1
Q

explicitly allow

A

that a specific

type of traffic should be granted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

explicitly deny

A

traffic should not be granted access,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

implicit deny

A

block all.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

stateless packet inspection

A

doesnt remember memory of packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

stateful packet inspection

A

header in

each packet. It can distinguish between legitimate and illegitimate packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application-level gateway

A

supports address and port translation

a (ftp. )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Circuit-level gateway

A

Works at the session layer of the OSI model, and applies
security mechanisms when a TCP or UDP connection is established;

layer between application and transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DMZ

A

sits between internet and actual network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

application firewalls

A

HTTP protect HTTP sessions from XSS attacks and SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IP proxy:

A

Uses NAT. anonymous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Caching proxy:

A

web 1 caching http traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

proxy server

A

sits between private and public network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internet content

filter ,

A

(software)
websites vaccessed, e-mail, instant messaging, and more.

revoked certificates and certificate revocation
lists, or CRLs, will not be filtered because they are only published periodically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Web security gateways

A

that scan for viruses, filter content, and

act as data loss prevention (DLP) devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DPL

A

protect data by way of content

inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network DPL

A

perimeter of the network.protects classifcaled info

17
Q

ENDPOINT DLP

A

operate on individual

18
Q

STORAGE DLP

A

has found its way into long-term

storage and data centers

19
Q

false positive

A

NIPS blocks legitimate

traffic, it would be known as a \

20
Q

FALSE NEGATIVE

A

lets that

attack through thinking it is legitimate traffic,