Chapter 6 - Firewalls Flashcards

1
Q

If the packet is not a provable attack packet, the firewall passes the packet on to its destination.

This is called a __________.

A

Pass/deny decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewalls usually record information about each dropped packet in a __________.

This process is called __________.

A
  1. Log file

2. Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Many firms have ______ which filter traffic through different parts of the internal network.

A

Internal firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The firewall which examines packets entering the network from the outside is called _________.

A

Ingress filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The firewall which examines packets leaving the network from the inside is called _________.

A

Egress filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewalls must be able to filter traffic at _____ which is the maximum speed of the lines that are connected to it.

A

Wire speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the six types of filtering methods?

A
  1. Stateful packet inspection filtering.
  2. Static packet filtering.
  3. Network address translation.
  4. Application proxy filtering.
  5. Intrusion prevention system filtering.
  6. Antivirus filtering.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All main border firewalls use _____.

A

Stateful packet inspection (SPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of filtering looks at packets one at a time while isolated?

A

Static packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What types of attacks can ‘static packet filtering’ stop?

A
  1. Internet Control Message Protocol (ICMP) echo messages.

2. Packets that are spoofed with different IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Static packet filtering is not used as a _____.

A

Main border firewall filtering mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

“Nearly all” corporate border firewalls use the _____.

A

Stateful packet inspection (SPI) filtering method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SPI focuses on _____ which are _____ b/w different programs on different computers.

A
  1. Connections

2. Persistent conversations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A _____ is a distinct phase in a connection b\w two applications.

A

State

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ uses specific examination methods depending on the _____ of the _____.

A
  1. Stateful packet inspection
  2. State
  3. Connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The vast majority of _____ are not a part of _____.

A
  1. Packets

2. Connection-opening attempts

17
Q

In SPI, if the _____ is part of an existing connection, the packet is passed, usually without further _____.

A
  1. Packet

2. Filtering

18
Q

In SPI, if the _____ is not part of an existing connection, the packet is _____ and _____.

A
  1. Packet
  2. Dropped
  3. Logged
19
Q

_____ consist of a series of rules that are _____ to the default behavior.

A
  1. Access control lists

2. Exceptions

20
Q

A secondary type of protection used in firewalls is _____.

A

Network address translation (NAT)

21
Q

What ranges from 1024 to 4999?

A

Ephemeral port numbers

22
Q

The _____ firewall intercepts all _____ traffic and replaces source __ addresses and source ____ numbers with (stand-in) external versions.

A
  1. NAT
  2. Outgoing
  3. IP
  4. Port
23
Q

What are some types of application proxy firewall protections?

A
  1. Internal IP address hiding.
  2. Header destruction.
  3. Protocol fidelity.
24
Q

Traditional firewalls don’t what?

A

Don’t do antivirus filtering.

25
Q

Unified Threat Management (UTM) Firewalls use what methods?

A
  1. SPI
  2. Antivirus filtering
  3. VPNs
  4. DoS protection
  5. NAT
26
Q

Intrusion Prevention Systems (IPSs) use… and can…

A

IDS filtering methods, as well as being able to stop ‘some’ kinds of attacks rather than only identifying threats.

27
Q

If the packet is a _______ the firewall drops the packet.

A

Provable attack packet

28
Q

Heavy processing requirements involving IDSs are due to what types of methods?

A
  1. Deep Packet Inspection (DPI).

2. Packet Stream Analysis (PSA).

29
Q

What do IPSs do when they detect potentially suspicious traffic at the high end of the Attack Identification Confidence Spectrum (AICS)?

A
  1. Drop packets (dangerous but highly effective).

2. Bandwidth limitation.

30
Q

Unified Threat Management (UTM) embraces both _____ firewalls and _____ filtering methods.

A
  1. Traditional

2. Antivirus

31
Q

Main Border Firewalls are…

A

At the point where the corporate network connects to the Internet.

32
Q

Between the border firewall and the Internet is the sites _____ and stops simple _____.

A
  1. Screening border router

2. High-volume

33
Q

What is a positive of the SBR?

A

It economically reduces the load on the main border firewall.

34
Q

Internal Firewalls do what?

A

Internal firewalls control the traffic flow in b/w different parts of the firms internal network.

35
Q

What is a Host Firewall?

A

A host-based firewall is a piece of software running on a single host that can restrict incoming and outgoing network activity for that host only.

36
Q

What does one create when using (1) border, (2) internal, and (3) host firewalls?

A

It creates defense-in-depth.

37
Q

The border firewall is multihomed, meaning that it…

A

Connects to multiple subnets.

38
Q

What is the DMZ?

A

A subnet that contains all of the servers and application proxy firewalls that must be accessible to the outside world.