Firewall Prevention Flashcards

1
Q

These are sources of information that provide real-time or updated data on current cybersecurity threats, vulnerabilities, and attack tactics. Threat intelligence feeds help organizations stay informed about potential threats and improve their security posture.

A

Threat Intelligence Feeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is a security technique that focuses on monitoring and analyzing the behavior of systems, networks, or users. It looks for unusual or malicious activities by comparing current behavior to established baselines.

A

Behavior-Based Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____________ is a security system that monitors network traffic for suspicious activities or patterns, while IPS takes action to prevent or block potential threats based on the detected anomalies.

A

IDS, IPS,
Intrusion Detection/Prevention System (IDS/IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This involves the management and restriction of applications that can be run on a network or system to prevent unauthorized or risky software from being used.

A

Application Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This refers to the examination of data packets or content to identify and filter out malicious or undesirable content, such as malware or inappropriate materials.

A

Content Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is the practice of dividing a network into smaller, isolated segments to enhance security. It limits lateral movement for attackers and contains potential breaches.

A

Network Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It involves verifying the identity of devices attempting to connect to a network or system and applying access controls based on device characteristics and user privileges.

A

Device Authentication and Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____________ is a security measure that validates ARP packets to prevent ARP spoofing attacks, which can lead to man-in-the-middle attacks.

A

ARP Inspection/Address Resolution Protocol (ARP) inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This access control technique permits or denies network access based on the Media Access Control (MAC) addresses of devices. It can be used to restrict network access to authorized devices.

A

MAC Address Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____________ limits and controls the devices that can connect to network switch ports, preventing unauthorized access and network attacks.

A

Port Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

These are predefined rules and policies that govern who can access specific resources, such as files, applications, or network segments, and what actions they can perform.

A

Access Control Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firewalls enforce rules that determine which network traffic is allowed or denied based on predefined criteria, such as IP addresses, ports, and protocols.

A

Firewall Rules and Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This involves incorporating threat intelligence data into security systems to improve the ability to detect and respond to emerging threats.

A

Threat Intelligence Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Scheduled assessments of systems, networks, and applications to identify vulnerabilities and assess overall security effectiveness.

A

Regular Security Audits and Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____________ enforces policies to ensure that only authorized and compliant devices can access a network. It often involves authentication, endpoint security checks, and policy enforcement.

A

Network Access Control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____________ keep track of the state of active connections and make decisions based on the context of the traffic, improving security by understanding the state of network sessions.

A

Stateful Firewall Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Filtering and inspecting traffic at the application layer of the OSI model, which allows for granular control over specific applications and services.

A

Application Layer Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_____________ requires users to provide multiple forms of authentication (e.g., password, fingerprint, token) to access a system or application, enhancing security beyond just a password.

A

Multi-Factor Authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It restricts the rate at which certain actions or requests can be made, which can help prevent denial-of-service attacks and control resource usage.

A

Rate Limiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The process of scanning and filtering incoming and outgoing emails for spam, malware, and other threats to protect email communication.

A

Email Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Blocking or allowing access to websites based on predefined URL categories or content to enforce security policies.

A

URL Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Rules and settings that define how authentication is performed, including password complexity requirements, account lockout policies, and authentication methods.

A

Authentication Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A specialized firewall that focuses on protecting web applications by inspecting and filtering web traffic to block common web application attacks.

A

Web Application Firewall (WAF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Monitoring and controlling both content and application usage on a network to enforce security policies and prevent unauthorized activities.

A

Content Filtering and Application Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Using regular expressions to search for specific patterns or strings within data, which is useful for identifying and blocking malicious content.

A

Regular Expression (Regex) Pattern Matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Analyzing HTTP headers and content to identify and block malicious or unauthorized web traffic.

A

HTTP Header and Content Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Adhering to coding best practices and security guidelines to develop software and applications that are less vulnerable to exploits.

A

Secure Coding Practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Monitoring and filtering Domain Name System (DNS) traffic to block malicious domains and prevent DNS-related attacks.

A

DNS Inspection and Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Implementing security measures at the application layer to detect and prevent application-specific attacks and vulnerabilities.

A

Application Layer Threat Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Combining sandboxing (isolated execution environments) with behavioral analysis to detect and analyze threats in a controlled environment.

A

Sandboxing and Behavioral Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

_____________ is a set of tools and processes designed to prevent sensitive data from being accessed, shared, or leaked without authorization. It involves monitoring, classifying, and protecting data throughout its lifecycle.

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

_____________ is a suite of extensions to DNS that adds cryptographic security to prevent DNS spoofing and ensure the authenticity and integrity of DNS data.

A

DNS Security (DNSSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

This involves analyzing DNS traffic to identify and filter out malicious or unwanted domain requests, such as those associated with phishing or malware distribution.

A

DNS Filtering and Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

_____________ restricts access to certain websites or types of content, often based on predefined categories or keywords, to enforce security and compliance policies.

A

Content Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

This technique allows network administrators to define routing policies based on specific criteria, such as source IP address or application type, to control how network traffic is forwarded.

A

Policy-Based Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

It refers to the integration of threat intelligence data into DNS security measures to enhance the detection and prevention of DNS-related threats.

A

DNS Threat Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

This involves implementing measures to mitigate DNS amplification attacks, which abuse open DNS resolvers to amplify and amplify traffic towards a target.

A

DNS Amplification Attack Prevention

38
Q

These services assess the reputation of domains based on their historical behavior, helping to identify and block potentially malicious or untrustworthy domains.

A

Domain Reputation Services

39
Q

_____________ redirects malicious or suspicious domain requests to a controlled server, effectively blocking access to malicious content and providing threat visibility.

A

DNS Sinkholing

40
Q

_____________ is a firewall technology that examines the state of active connections and makes decisions based on the context of the traffic, enhancing security by understanding the state of network sessions.

A

Stateful Packet Inspection (SPI)

41
Q

_____________ are rules and configurations put in place to detect and mitigate DoS attacks, which aim to disrupt or overload a network or service.

A

DoS Protection Policies/Denial-of-Service (DoS) protection policies

42
Q

This involves the real-time identification and response to security threats and anomalies using dynamic, automated mechanisms.

A

Dynamic Detection and Mitigation

43
Q

Rate limiting restricts the rate at which certain actions or requests can be made, helping to prevent overuse of network resources and mitigate abuse.

A

Traffic Rate Limiting

44
Q

Protecting against threats and attacks that target the application layer of the OSI model, such as application-layer DDoS attacks and web application vulnerabilities.

A

Application-Layer Protection

45
Q

Assessing the reputation of URLs and web domains to determine if they are associated with malicious or unwanted content and blocking access accordingly.

A

URL Reputation Filtering

46
Q

Identifying and blocking malware and exploits in network traffic to prevent infections and compromise of systems.

A

Malware and Exploit Detection

47
Q

Encryption secures data in transit using cryptographic protocols, and VPNs (Virtual Private Networks) provide secure, encrypted communication channels over public networks.

A

Encryption and VPNs

48
Q

_____________ involves examining network packets and applying _____________ rules to determine whether to allow or block traffic based on specific criteria.

A

Packet Filtering, Access Control

49
Q

_____________ is a security system that monitors wireless networks for unauthorized access points, rogue devices, and suspicious activities.

A

Wireless Intrusion Detection System (WIDS)

50
Q

_____________ solutions provide real-time monitoring and response capabilities on endpoints (computers and devices). Integration involves connecting _____________ with other security systems for improved visibility and response.

A

Endpoint Detection and Response (EDR) Integration

51
Q

Analyzing network ports and services to identify vulnerabilities, misconfigurations, or unauthorized services running on network devices.

A

Port and Service Analysis

52
Q

Managing and enforcing _____________ methods and _____________ to ensure that only authorized users can access resources.

A

Authentication, Access Control

53
Q

_____________ uses machine learning and behavior analysis to detect abnormal or suspicious activities and behaviors among users and entities on a network.

A

User and Entity Behavior Analytics (UEBA)

54
Q

Recording and monitoring access to systems and resources to track user activities, detect anomalies, and investigate security incidents.

A

Access Auditing and Logging

55
Q

Managing and updating firmware and software patches on network devices and systems to address security vulnerabilities and ensure they are up-to-date.

A

Firmware and Patch Management

56
Q

This involves controlling and verifying user access to systems, networks, and data through authentication mechanisms and access policies.

A

Access Control and Authentication

57
Q

Setting rules to block online advertisements and potentially malicious content in web browsers and applications.

A

Ad-Blocking Rules

58
Q

_____________ is an isolated environment where untrusted or potentially malicious files or programs can be executed and analyzed safely without affecting the host system.

A

Sandboxing

59
Q

Decrypting and inspecting encrypted network traffic to detect and prevent threats hidden within encrypted communication.

A

Encrypted Traffic Inspection

60
Q

Decrypting SSL/TLS-encrypted traffic for inspection and analysis, allowing security systems to inspect the content of encrypted connections for threats and vulnerabilities.

A

SSL/TLS Decryption

61
Q

_____________ is a framework that manages digital keys and certificates to ensure secure communication. _____________ includes the infrastructure and tools needed for key generation, distribution, and management.

A

Public Key Infrastructure (PKI), Public Key Infrastructure (PKI) Support

62
Q

_____________ is the intentional limiting or regulating of network or application traffic to prevent overuse, abuse, or congestion, often used as a security measure to protect resources.

A

Throttling

63
Q

This involves inspecting network traffic across multiple protocols to identify and mitigate threats that may exploit various protocol vulnerabilities.

A

Multi-Protocol Inspection

64
Q

Integrating security systems with authentication services like LDAP or Active Directory to enhance user authentication and access control.

A

Integration with Authentication Services

65
Q

_____________ is the process of blocking or redirecting DNS requests to prevent access to malicious or inappropriate websites.

A

DNS Filtering

66
Q

These are DNS servers configured to provide secure and validated DNS responses, helping to prevent DNS-related attacks.

A

Secure DNS Resolvers

67
Q

_____________, also known as SSL/TLS decryption, involves decrypting and inspecting encrypted SSL/TLS traffic to detect and prevent threats hidden within encrypted connections.

A

SSL Inspection

68
Q

_____________ encompasses measures to protect email communications from spam, phishing, malware, and other email-borne threats.

A

Email Security

69
Q

This involves analyzing the content of files or data packets to detect and prevent malicious content, including malware and exploits.

A

Content Analysis

70
Q

This refers to the use of extensive and up-to-date threat intelligence data to identify and respond to advanced threats and attacks.

A

Advanced Threat Intelligence

71
Q

_____________ restricts access to websites based on predefined categories or policies to enforce security and compliance.

A

Web Filtering

72
Q

Inspecting and scanning content, such as files and data packets, for malware and malicious content.

A

Content Inspection and Anti-Malware Scanning

73
Q

Filtering email traffic to detect and block spam, phishing attempts, and malware.

A

Email Security Filtering

74
Q

The use of encryption and secure communication protocols (e.g., _____________) to protect data in transit and maintain confidentiality and integrity.

A

Encryption and Secure Protocols, (e.g., HTTPS, SSL/TLS)

75
Q

Managing user sessions to ensure proper access control and security during a user’s interaction with a system or application.

A

Session Management

76
Q

Implementing policies to automatically log out users after a period of inactivity to reduce the risk of unauthorized access.

A

Session Timeout and Inactivity Management

77
Q

Implementing filtering mechanisms for both email and web traffic to protect against email and web-based threats.

A

Email and Web Filtering

78
Q

Training programs and initiatives to educate users about cybersecurity best practices and potential risks.

A

User Awareness Training

79
Q

_____________ is an advanced network analysis technique that examines the content and attributes of data packets to detect and classify traffic, often used for security and monitoring purposes.

A

Deep Packet Inspection (DPI)

80
Q

Implementing policies and controls to manage and secure connected devices (e.g., USB drives, mobile devices) within a network.

A

Device Control

81
Q

Security measures to protect Voice over Internet Protocol (VoIP) communication systems from attacks and eavesdropping.

A

VoIP Security

82
Q

Gathering, analyzing, and using information about potential threats and vulnerabilities to improve security measures.

A

Threat Intelligence

83
Q

Providing ongoing education and awareness programs to help users recognize and respond to security threats effectively.

A

User Education

84
Q

Ensuring the authenticity of calls in VoIP or telecommunications systems to prevent spoofing and fraud.

A

Call Authentication

85
Q

Restricting access to websites based on policies and URLs to prevent access to malicious or inappropriate content.

A

Web Filtering and URL Filtering

86
Q

A form of analysis that uses rules and algorithms to detect unknown or evolving threats based on patterns and behaviors.

A

Heuristic Analysis

87
Q

Data sources that provide information on vulnerabilities and threats that are not yet publicly known or patched.

A

Zero-Day Feeds

88
Q

Combining _____________ feeds to enhance detection and response capabilities against emerging threats.

A

Threat Intelligence and Zero-Day Feeds

89
Q

Identifying abnormal or suspicious activities and behaviors within a network or system using advanced algorithms and machine learning.

A

Advanced Anomaly Detection

90
Q

Analyzing user and system behaviors to detect anomalies and potentially malicious activities.

A

Behavioral Analysis