Chapter 6 - Firewalls Flashcards

1
Q

If the packet is not a provable attack packet, the firewall passes the packet on to its destination.

This is called a __________.

A

Pass/deny decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewalls usually record information about each dropped packet in a __________.

This process is called __________.

A
  1. Log file

2. Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Many firms have ______ which filter traffic through different parts of the internal network.

A

Internal firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The firewall which examines packets entering the network from the outside is called _________.

A

Ingress filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The firewall which examines packets leaving the network from the inside is called _________.

A

Egress filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewalls must be able to filter traffic at _____ which is the maximum speed of the lines that are connected to it.

A

Wire speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the six types of filtering methods?

A
  1. Stateful packet inspection filtering.
  2. Static packet filtering.
  3. Network address translation.
  4. Application proxy filtering.
  5. Intrusion prevention system filtering.
  6. Antivirus filtering.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All main border firewalls use _____.

A

Stateful packet inspection (SPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of filtering looks at packets one at a time while isolated?

A

Static packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What types of attacks can ‘static packet filtering’ stop?

A
  1. Internet Control Message Protocol (ICMP) echo messages.

2. Packets that are spoofed with different IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Static packet filtering is not used as a _____.

A

Main border firewall filtering mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

“Nearly all” corporate border firewalls use the _____.

A

Stateful packet inspection (SPI) filtering method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SPI focuses on _____ which are _____ b/w different programs on different computers.

A
  1. Connections

2. Persistent conversations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A _____ is a distinct phase in a connection b\w two applications.

A

State

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ uses specific examination methods depending on the _____ of the _____.

A
  1. Stateful packet inspection
  2. State
  3. Connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The vast majority of _____ are not a part of _____.

A
  1. Packets

2. Connection-opening attempts

17
Q

In SPI, if the _____ is part of an existing connection, the packet is passed, usually without further _____.

A
  1. Packet

2. Filtering

18
Q

In SPI, if the _____ is not part of an existing connection, the packet is _____ and _____.

A
  1. Packet
  2. Dropped
  3. Logged
19
Q

_____ consist of a series of rules that are _____ to the default behavior.

A
  1. Access control lists

2. Exceptions

20
Q

A secondary type of protection used in firewalls is _____.

A

Network address translation (NAT)

21
Q

What ranges from 1024 to 4999?

A

Ephemeral port numbers

22
Q

The _____ firewall intercepts all _____ traffic and replaces source __ addresses and source ____ numbers with (stand-in) external versions.

A
  1. NAT
  2. Outgoing
  3. IP
  4. Port
23
Q

What are some types of application proxy firewall protections?

A
  1. Internal IP address hiding.
  2. Header destruction.
  3. Protocol fidelity.
24
Q

Traditional firewalls don’t what?

A

Don’t do antivirus filtering.

25
Unified Threat Management (UTM) Firewalls use what methods?
1. SPI 2. Antivirus filtering 3. VPNs 4. DoS protection 5. NAT
26
Intrusion Prevention Systems (IPSs) use... and can...
IDS filtering methods, as well as being able to stop 'some' kinds of attacks rather than only identifying threats.
27
If the packet is a _______ the firewall drops the packet.
Provable attack packet
28
Heavy processing requirements involving IDSs are due to what types of methods?
1. Deep Packet Inspection (DPI). | 2. Packet Stream Analysis (PSA).
29
What do IPSs do when they detect potentially suspicious traffic at the high end of the Attack Identification Confidence Spectrum (AICS)?
1. Drop packets (dangerous but highly effective). | 2. Bandwidth limitation.
30
Unified Threat Management (UTM) embraces both _____ firewalls and _____ filtering methods.
1. Traditional | 2. Antivirus
31
Main Border Firewalls are...
At the point where the corporate network connects to the Internet.
32
Between the border firewall and the Internet is the sites _____ and stops simple _____.
1. Screening border router | 2. High-volume
33
What is a positive of the SBR?
It economically reduces the load on the main border firewall.
34
Internal Firewalls do what?
Internal firewalls control the traffic flow in b/w different parts of the firms internal network.
35
What is a Host Firewall?
A host-based firewall is a piece of software running on a single host that can restrict incoming and outgoing network activity for that host only.
36
What does one create when using (1) border, (2) internal, and (3) host firewalls?
It creates defense-in-depth.
37
The border firewall is multihomed, meaning that it...
Connects to multiple subnets.
38
What is the DMZ?
A subnet that contains all of the servers and application proxy firewalls that must be accessible to the outside world.