Expanded_Firewall_Security_Flashcards
What is a firewall?
A security tool that monitors incoming and outgoing network traffic based on predefined rules.
What are the uses of a firewall?
Prevents unauthorized remote access, indecent content, destructive content, and guarantees security based on protocol/IP.
What are the limitations of firewalls?
Cannot stop access to malicious websites, protect against internal threats, or secure already infected systems.
What is a DMZ network?
A perimeter network that adds an extra layer of security to protect an internal network from untrusted traffic.
What are the benefits of dual firewall DMZ design?
It allows external traffic only to the DMZ and ensures tighter security between the DMZ and internal network.
What is a single firewall DMZ design?
Uses three or more network interfaces to separate external, internal, and DMZ networks, controlling traffic flow.
What is a reverse proxy server?
Acts on behalf of servers, providing load balancing, caching, and compression, and hides server identities.
What is a forward proxy server?
Acts on behalf of clients, hiding their identities and enabling bypassing restrictions or caching content.
What is a packet filtering firewall?
Operates at the network layer, allowing or denying packets based on source/destination IP and protocols.
What are the advantages of circuit-level firewalls?
They verify TCP connections, hide user identities, and minimally impact network performance.
What are the drawbacks of circuit-level firewalls?
Cannot inspect the content of data packets, allowing malware to bypass with legitimate TCP handshakes.
What is an application-level firewall?
Controls traffic to/from specific applications, inspecting for vulnerabilities like SQL injections or XSS.
What are active application firewalls?
Actively inspect and block malicious requests, preventing attacks like SQL injections.
What are passive application firewalls?
Inspect requests but do not block them, similar to intrusion detection systems.
What are software firewalls?
Installed on individual devices, providing granular control but requiring significant CPU/RAM resources.