Ch15 Physical Security and Risk Flashcards
A combination of hardware and software that protect an entire cooperate private network from the public network is known as a ____
Network based firewall
Host based firewalls are usually___ based
software based
What do ACLs do?
Reside on routers and determine by the IP addresses which machines are allowed to use those routers and in what direction/
Layer2 security on switches is ____
Port security. Everything is defined by MAC addresses
DMZ(demilitarized zone) is used for what?
separates an internal LAN from other untrusted networks. provides an additional layer of security to the LAN as it restricts the ability of hackers to directly access internal servers and data via the Internet.
____is when a firewall looks at incoming packets and applies them to a set of rules in the ACL if it passes it gets sent on if it fails it gets discarded.
Packet filtering
an_____hides the addresses of all the devices on the internal network by exchanging its IP address for the address of the requesting station.
IP Proxy
Forward proxies work on behalf of the ____
client
Reverse proxies work on behalf of the
Server
___network firewalls that keep track of the various data streams passing through
Stateful
___network firewalls that do not monitor the status of the connections passing through it
Stateless
What is the advantage of stateless firewalls over stateful firewalls
Uses less memory
an_____firewall is a form of firewall that controls input, output and and or access from or by an application
Application
____blocks data based on the content rather then the source.
Content filtering
What is used to filter email and websites
Content filter