Firewalls Flashcards

1
Q

A firewall can be either
S_______ or H________.

A

Software
Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewall is a system that is designed to prevent _____________ ______ from entering a private network, by _________ the information that comes in from the internet.

A

Unauthorized access,
Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A firewall blocks ________ _______ and permits ________ traffic

A

Unwanted traffic,
Wanted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

So basically, a firewall filters the incoming network ____ _______ , and determines by its _______ _____, if it is allowed to enter the network.

A

Data packets, access rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In todays high-tech world, a firewall is _________ to every business to keep their ________ safe.

A

Essential, network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

One way that a firewall controls the flow of traffic coming into and out of a network, is through its _______ _______ ____ or (___)

A

Access control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ACL is a ____ of _____ on what can access the ________.

A

List, rules , network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ACL either _______ or _______ permissions.

A

Allows , Denies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Most firewalls come with a default rule of ________ ____, what that basically means is that the firewall will only allow _______ to enter the network that the ___ specifically says that it will _____.

A

Implicit deny, traffic , ACL , allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewalls come in different types, and one type is called a ____ ______ ________.

A

Host based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Host based firewall is a _________ firewall.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Host based firewall is the type of firewall that is installed on a _________, and it protects that computer ____ and nothing else.

A

Computer, only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Later versions of Microsoft operating systems come pre-packaged with a ____ _____ _______. You can turn the firewall on or off if you want, and you can also create exceptions to the firewall based on the application name on the _________ tab.

A

Host based firewall, exceptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Of course , you can always purchase a _____-_____ firewall, and install it on your computer.

A

Third-party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network based firewall, is a combination of ________ and ________. And it operates at the network _____, it is placed between a _______ network and the internet.

A

Hardware, and software
Layer
Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unlike a host based firewall, where it only protects its own computer, a network based firewall protects an ______ network.

A

Entire

17
Q

Network based firewall protects an entire network through __________ rules that is applied to the entire network, so that any harmful activity can be _______, before it reaches the __________.

A

Management, stopped, computers

18
Q

Firewalls inspect traffic in a couple of ways
(What are the two ways?)

A

-Stateful
-Stateless

19
Q

Stateful firewall, monitors all the connections and ____ ______ that are passing through, and keeps a ______ of it.

A

Data streams, record

20
Q

Stateless firewall, uses an ___ to allow or deny traffic.

A

ACL

21
Q

Content filtering is a technology that is commonly used in _____.

A

Email

22
Q

As the name content filtering implies, it filters data based on their _______, and not on the ______.

A

Content , source

23
Q

(Content Filtering) This type of filter is commonly used to filter ______ ____.

A

Email spam

24
Q

And another type of filter is called s__________ I____________.

A

Signature identification

25
Q

Signature identification is used to detect _______ that have a well-known ________ pattern.

A

Viruses, behavior

26
Q

Certain viruses and _______ have a common behavior, and firewalls that use ___________ ____________ are programmed to spot this behavior. And once it’s spotted it takes action to _____ the intruder

A

Malware, signature, identification, block

27
Q

Intrusion detection or prevention system (IDS/IPS) is a hardware tool that is typically placed between the ________ and the ________.

A

Internet , firewall

28
Q

IDS/IPS job is to alert and prevent a network from _______ ______.

A

Outside attacks

29
Q

IDS/IPS monitors traffic flowing through a _______, looking for suspicious patterns. If it finds any, alerts the network ____________ of a pending danger.

A

Network, administrator