Chapter 15 Flashcards

1
Q

What is the DMZ used for?

A

It creates a security zone that allows public traffic but the traffic is isolated from the company private network. p. 528

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what does it mean if a firewall is configured on defalt deny?

A

Only packets specified by the administrator are allowed through. p. 529

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does it mean if a firewall is configured on default alow?

A

All traffic is allowed through unless specifically blocked. p. 529

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a network based firewall?

A

It is what companies use to protect their private network form public networks. p. 530

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the defining charachteristic of a network based firewall?

A

it is designed to protect an entire network of computers instead of just one system. p. 530

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the defining charachteristic of a host based firewall?

A

It protects only one machine. p. 530

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the funciton of the ACL?

A

It is a part of your router that determines which machines are allowed to use the router and in what direction. p. 531

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is an ACL applied to a protocol?

A

A distribution list p. 532

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are two main types of ACLs?

A

Standard ACL

Extended ACL p. 533

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe Standard ACLs.

A

They only use one source IP address in an IP packet as the condition precident to allowing or denying a suite of protocols. p. 532

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe Extended ACLs.

A

They evaluate headers in layer 3 and 4 of an IP packet. They evaluate both source and destination IP addresses, the protocol field in the network layer header and the prot number at the trnasport layer header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When do you employ port security?

A

When security needs to be maintained between users within the network. p. 533

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false: People outside your network primarily access your web servers, FTP servers and mail relay servers.

A

True p. 534

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

true or false: Protocol switching works becasue most attacks take place on the TCP/IP stack.

A

True p. 534

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define packet filtering.

A

The ability of a router or a firewall to discard packets that dont meet the right criteria. p. 537

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: Firewalls use static packet filtering to ensure that the packets they forward match sessions initiated on their private side.

A

False p. 537

17
Q

what are some types of proxy servers?

A

IP proxy
Web (HTTP) proxy
FTP proxy
SMTP proxy p. 540

18
Q

How does an IP proxy work?

A

It hides the IP addresses of all the devices on the internal network by exchanging its IP address for the address of any requesting station .

19
Q

How do Web proxies work?

A

They handle HTTP requests on behalf of the sending workstation. A clients web browser asksa aweb server on the Internate fora web page using an HTTP request. The proxy server changes from the address of the HTTP request to its own network address and sends it to the internet web server. p. 539

20
Q

what is the most important implimentation of a web proxy?

A

the proxy cache server. p. 540

21
Q

What does a proxy cache server do?

A

recieves and HTTP request from a web browser and then makes the request on behalf of the sending workstation. When the requsted page is returned the proxy server caches a copy of the page locally. The next time someone requests that page it can be done locally instead of the proxy server having to send a new request to the web server. p. 540

22
Q

what does an FTP proxy do?

A

It handles the uploading and downloading of files froma server on behalf of a workstation. p. 540

23
Q

what does SMTP proxy do?

A

They handle internet e-mail. p. 540

24
Q

describe a stateful firewall.

A

a firewall that deeps track of the various data streams passing through it. p. 541

25
Q

describe stateless firewall.

A

it does not monitor the status of the connections passign thorugh it. p. 541