Ch15 Physical Security and Risk Flashcards

1
Q

A combination of hardware and software that protect an entire cooperate private network from the public network is known as a ____

A

Network based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Host based firewalls are usually___ based

A

software based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do ACLs do?

A

Reside on routers and determine by the IP addresses which machines are allowed to use those routers and in what direction/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Layer2 security on switches is ____

A

Port security. Everything is defined by MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DMZ(demilitarized zone) is used for what?

A

separates an internal LAN from other untrusted networks. provides an additional layer of security to the LAN as it restricts the ability of hackers to directly access internal servers and data via the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____is when a firewall looks at incoming packets and applies them to a set of rules in the ACL if it passes it gets sent on if it fails it gets discarded.

A

Packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

an_____hides the addresses of all the devices on the internal network by exchanging its IP address for the address of the requesting station.

A

IP Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Forward proxies work on behalf of the ____

A

client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reverse proxies work on behalf of the

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___network firewalls that keep track of the various data streams passing through

A

Stateful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___network firewalls that do not monitor the status of the connections passing through it

A

Stateless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the advantage of stateless firewalls over stateful firewalls

A

Uses less memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

an_____firewall is a form of firewall that controls input, output and and or access from or by an application

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____blocks data based on the content rather then the source.

A

Content filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is used to filter email and websites

A

Content filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define context awareness

A

The ability of a firewall to detect different applications, users and devices instead of just an IP address.

17
Q

What are some signature based attacks a firewall can stop?

A

Viruses, spyware, network attacks, worms and software bugs.

18
Q

What is the function of a IDS?

A

Monitors and alerts against OS and application exploits.

19
Q

What is the function of a IPS?

A

Protects against OS and application exploits by blocking the attacks.

20
Q

Vulnerability scanners are used for what?

A

system scans to determine potential flaws in a networks security.

21
Q

UTM(unified threat management) is what?

A

Devices that preform multiple security functions within the same appliance.

22
Q

What is a VPN concentrator?

A

A device that creates remote access for VPNs either for users logging in remotely, or for a large site-to-site VPN.