Firewall Prevention Flashcards

1
Q

These are sources of information that provide real-time or updated data on current cybersecurity threats, vulnerabilities, and attack tactics. Threat intelligence feeds help organizations stay informed about potential threats and improve their security posture.

A

Threat Intelligence Feeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is a security technique that focuses on monitoring and analyzing the behavior of systems, networks, or users. It looks for unusual or malicious activities by comparing current behavior to established baselines.

A

Behavior-Based Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____________ is a security system that monitors network traffic for suspicious activities or patterns, while IPS takes action to prevent or block potential threats based on the detected anomalies.

A

IDS, IPS,
Intrusion Detection/Prevention System (IDS/IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This involves the management and restriction of applications that can be run on a network or system to prevent unauthorized or risky software from being used.

A

Application Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This refers to the examination of data packets or content to identify and filter out malicious or undesirable content, such as malware or inappropriate materials.

A

Content Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is the practice of dividing a network into smaller, isolated segments to enhance security. It limits lateral movement for attackers and contains potential breaches.

A

Network Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It involves verifying the identity of devices attempting to connect to a network or system and applying access controls based on device characteristics and user privileges.

A

Device Authentication and Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____________ is a security measure that validates ARP packets to prevent ARP spoofing attacks, which can lead to man-in-the-middle attacks.

A

ARP Inspection/Address Resolution Protocol (ARP) inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This access control technique permits or denies network access based on the Media Access Control (MAC) addresses of devices. It can be used to restrict network access to authorized devices.

A

MAC Address Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____________ limits and controls the devices that can connect to network switch ports, preventing unauthorized access and network attacks.

A

Port Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

These are predefined rules and policies that govern who can access specific resources, such as files, applications, or network segments, and what actions they can perform.

A

Access Control Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firewalls enforce rules that determine which network traffic is allowed or denied based on predefined criteria, such as IP addresses, ports, and protocols.

A

Firewall Rules and Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This involves incorporating threat intelligence data into security systems to improve the ability to detect and respond to emerging threats.

A

Threat Intelligence Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Scheduled assessments of systems, networks, and applications to identify vulnerabilities and assess overall security effectiveness.

A

Regular Security Audits and Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____________ enforces policies to ensure that only authorized and compliant devices can access a network. It often involves authentication, endpoint security checks, and policy enforcement.

A

Network Access Control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____________ keep track of the state of active connections and make decisions based on the context of the traffic, improving security by understanding the state of network sessions.

A

Stateful Firewall Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Filtering and inspecting traffic at the application layer of the OSI model, which allows for granular control over specific applications and services.

A

Application Layer Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_____________ requires users to provide multiple forms of authentication (e.g., password, fingerprint, token) to access a system or application, enhancing security beyond just a password.

A

Multi-Factor Authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It restricts the rate at which certain actions or requests can be made, which can help prevent denial-of-service attacks and control resource usage.

A

Rate Limiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The process of scanning and filtering incoming and outgoing emails for spam, malware, and other threats to protect email communication.

A

Email Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Blocking or allowing access to websites based on predefined URL categories or content to enforce security policies.

A

URL Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Rules and settings that define how authentication is performed, including password complexity requirements, account lockout policies, and authentication methods.

A

Authentication Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A specialized firewall that focuses on protecting web applications by inspecting and filtering web traffic to block common web application attacks.

A

Web Application Firewall (WAF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Monitoring and controlling both content and application usage on a network to enforce security policies and prevent unauthorized activities.

A

Content Filtering and Application Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Using regular expressions to search for specific patterns or strings within data, which is useful for identifying and blocking malicious content.
Regular Expression (Regex) Pattern Matching
26
Analyzing HTTP headers and content to identify and block malicious or unauthorized web traffic.
HTTP Header and Content Inspection
27
Adhering to coding best practices and security guidelines to develop software and applications that are less vulnerable to exploits.
Secure Coding Practices
28
Monitoring and filtering Domain Name System (DNS) traffic to block malicious domains and prevent DNS-related attacks.
DNS Inspection and Filtering
29
Implementing security measures at the application layer to detect and prevent application-specific attacks and vulnerabilities.
Application Layer Threat Prevention
30
Combining sandboxing (isolated execution environments) with behavioral analysis to detect and analyze threats in a controlled environment.
Sandboxing and Behavioral Analysis
31
_____________ is a set of tools and processes designed to prevent sensitive data from being accessed, shared, or leaked without authorization. It involves monitoring, classifying, and protecting data throughout its lifecycle.
Data Loss Prevention (DLP)
32
_____________ is a suite of extensions to DNS that adds cryptographic security to prevent DNS spoofing and ensure the authenticity and integrity of DNS data.
DNS Security (DNSSEC)
33
This involves analyzing DNS traffic to identify and filter out malicious or unwanted domain requests, such as those associated with phishing or malware distribution.
DNS Filtering and Inspection
34
_____________ restricts access to certain websites or types of content, often based on predefined categories or keywords, to enforce security and compliance policies.
Content Filtering
35
This technique allows network administrators to define routing policies based on specific criteria, such as source IP address or application type, to control how network traffic is forwarded.
Policy-Based Routing
36
It refers to the integration of threat intelligence data into DNS security measures to enhance the detection and prevention of DNS-related threats.
DNS Threat Intelligence
37
This involves implementing measures to mitigate DNS amplification attacks, which abuse open DNS resolvers to amplify and amplify traffic towards a target.
DNS Amplification Attack Prevention
38
These services assess the reputation of domains based on their historical behavior, helping to identify and block potentially malicious or untrustworthy domains.
Domain Reputation Services
39
_____________ redirects malicious or suspicious domain requests to a controlled server, effectively blocking access to malicious content and providing threat visibility.
DNS Sinkholing
40
_____________ is a firewall technology that examines the state of active connections and makes decisions based on the context of the traffic, enhancing security by understanding the state of network sessions.
Stateful Packet Inspection (SPI)
41
_____________ are rules and configurations put in place to detect and mitigate DoS attacks, which aim to disrupt or overload a network or service.
DoS Protection Policies/Denial-of-Service (DoS) protection policies
42
This involves the real-time identification and response to security threats and anomalies using dynamic, automated mechanisms.
Dynamic Detection and Mitigation
43
Rate limiting restricts the rate at which certain actions or requests can be made, helping to prevent overuse of network resources and mitigate abuse.
Traffic Rate Limiting
44
Protecting against threats and attacks that target the application layer of the OSI model, such as application-layer DDoS attacks and web application vulnerabilities.
Application-Layer Protection
45
Assessing the reputation of URLs and web domains to determine if they are associated with malicious or unwanted content and blocking access accordingly.
URL Reputation Filtering
46
Identifying and blocking malware and exploits in network traffic to prevent infections and compromise of systems.
Malware and Exploit Detection
47
Encryption secures data in transit using cryptographic protocols, and VPNs (Virtual Private Networks) provide secure, encrypted communication channels over public networks.
Encryption and VPNs
48
_____________ involves examining network packets and applying _____________ rules to determine whether to allow or block traffic based on specific criteria.
Packet Filtering, Access Control
49
_____________ is a security system that monitors wireless networks for unauthorized access points, rogue devices, and suspicious activities.
Wireless Intrusion Detection System (WIDS)
50
_____________ solutions provide real-time monitoring and response capabilities on endpoints (computers and devices). Integration involves connecting _____________ with other security systems for improved visibility and response.
Endpoint Detection and Response (EDR) Integration
51
Analyzing network ports and services to identify vulnerabilities, misconfigurations, or unauthorized services running on network devices.
Port and Service Analysis
52
Managing and enforcing _____________ methods and _____________ to ensure that only authorized users can access resources.
Authentication, Access Control
53
_____________ uses machine learning and behavior analysis to detect abnormal or suspicious activities and behaviors among users and entities on a network.
User and Entity Behavior Analytics (UEBA)
54
Recording and monitoring access to systems and resources to track user activities, detect anomalies, and investigate security incidents.
Access Auditing and Logging
55
Managing and updating firmware and software patches on network devices and systems to address security vulnerabilities and ensure they are up-to-date.
Firmware and Patch Management
56
This involves controlling and verifying user access to systems, networks, and data through authentication mechanisms and access policies.
Access Control and Authentication
57
Setting rules to block online advertisements and potentially malicious content in web browsers and applications.
Ad-Blocking Rules
58
_____________ is an isolated environment where untrusted or potentially malicious files or programs can be executed and analyzed safely without affecting the host system.
Sandboxing
59
Decrypting and inspecting encrypted network traffic to detect and prevent threats hidden within encrypted communication.
Encrypted Traffic Inspection
60
Decrypting SSL/TLS-encrypted traffic for inspection and analysis, allowing security systems to inspect the content of encrypted connections for threats and vulnerabilities.
SSL/TLS Decryption
61
_____________ is a framework that manages digital keys and certificates to ensure secure communication. _____________ includes the infrastructure and tools needed for key generation, distribution, and management.
Public Key Infrastructure (PKI), Public Key Infrastructure (PKI) Support
62
_____________ is the intentional limiting or regulating of network or application traffic to prevent overuse, abuse, or congestion, often used as a security measure to protect resources.
Throttling
63
This involves inspecting network traffic across multiple protocols to identify and mitigate threats that may exploit various protocol vulnerabilities.
Multi-Protocol Inspection
64
Integrating security systems with authentication services like LDAP or Active Directory to enhance user authentication and access control.
Integration with Authentication Services
65
_____________ is the process of blocking or redirecting DNS requests to prevent access to malicious or inappropriate websites.
DNS Filtering
66
These are DNS servers configured to provide secure and validated DNS responses, helping to prevent DNS-related attacks.
Secure DNS Resolvers
67
_____________, also known as SSL/TLS decryption, involves decrypting and inspecting encrypted SSL/TLS traffic to detect and prevent threats hidden within encrypted connections.
SSL Inspection
68
_____________ encompasses measures to protect email communications from spam, phishing, malware, and other email-borne threats.
Email Security
69
This involves analyzing the content of files or data packets to detect and prevent malicious content, including malware and exploits.
Content Analysis
70
This refers to the use of extensive and up-to-date threat intelligence data to identify and respond to advanced threats and attacks.
Advanced Threat Intelligence
71
_____________ restricts access to websites based on predefined categories or policies to enforce security and compliance.
Web Filtering
72
Inspecting and scanning content, such as files and data packets, for malware and malicious content.
Content Inspection and Anti-Malware Scanning
73
Filtering email traffic to detect and block spam, phishing attempts, and malware.
Email Security Filtering
74
The use of encryption and secure communication protocols (e.g., _____________) to protect data in transit and maintain confidentiality and integrity.
Encryption and Secure Protocols, (e.g., HTTPS, SSL/TLS)
75
Managing user sessions to ensure proper access control and security during a user's interaction with a system or application.
Session Management
76
Implementing policies to automatically log out users after a period of inactivity to reduce the risk of unauthorized access.
Session Timeout and Inactivity Management
77
Implementing filtering mechanisms for both email and web traffic to protect against email and web-based threats.
Email and Web Filtering
78
Training programs and initiatives to educate users about cybersecurity best practices and potential risks.
User Awareness Training
79
_____________ is an advanced network analysis technique that examines the content and attributes of data packets to detect and classify traffic, often used for security and monitoring purposes.
Deep Packet Inspection (DPI)
80
Implementing policies and controls to manage and secure connected devices (e.g., USB drives, mobile devices) within a network.
Device Control
81
Security measures to protect Voice over Internet Protocol (VoIP) communication systems from attacks and eavesdropping.
VoIP Security
82
Gathering, analyzing, and using information about potential threats and vulnerabilities to improve security measures.
Threat Intelligence
83
Providing ongoing education and awareness programs to help users recognize and respond to security threats effectively.
User Education
84
Ensuring the authenticity of calls in VoIP or telecommunications systems to prevent spoofing and fraud.
Call Authentication
85
Restricting access to websites based on policies and URLs to prevent access to malicious or inappropriate content.
Web Filtering and URL Filtering
86
A form of analysis that uses rules and algorithms to detect unknown or evolving threats based on patterns and behaviors.
Heuristic Analysis
87
Data sources that provide information on vulnerabilities and threats that are not yet publicly known or patched.
Zero-Day Feeds
88
Combining _____________ feeds to enhance detection and response capabilities against emerging threats.
Threat Intelligence and Zero-Day Feeds
89
Identifying abnormal or suspicious activities and behaviors within a network or system using advanced algorithms and machine learning.
Advanced Anomaly Detection
90
Analyzing user and system behaviors to detect anomalies and potentially malicious activities.
Behavioral Analysis