Firewalls Flashcards
A firewall can be either
S_______ or H________.
Software
Hardware
Firewall is a system that is designed to prevent _____________ ______ from entering a private network, by _________ the information that comes in from the internet.
Unauthorized access,
Filtering
A firewall blocks ________ _______ and permits ________ traffic
Unwanted traffic,
Wanted
So basically, a firewall filters the incoming network ____ _______ , and determines by its _______ _____, if it is allowed to enter the network.
Data packets, access rules
In todays high-tech world, a firewall is _________ to every business to keep their ________ safe.
Essential, network
One way that a firewall controls the flow of traffic coming into and out of a network, is through its _______ _______ ____ or (___)
Access control list (ACL)
ACL is a ____ of _____ on what can access the ________.
List, rules , network
ACL either _______ or _______ permissions.
Allows , Denies
Most firewalls come with a default rule of ________ ____, what that basically means is that the firewall will only allow _______ to enter the network that the ___ specifically says that it will _____.
Implicit deny, traffic , ACL , allow
Firewalls come in different types, and one type is called a ____ ______ ________.
Host based firewall
Host based firewall is a _________ firewall.
Software
Host based firewall is the type of firewall that is installed on a _________, and it protects that computer ____ and nothing else.
Computer, only
Later versions of Microsoft operating systems come pre-packaged with a ____ _____ _______. You can turn the firewall on or off if you want, and you can also create exceptions to the firewall based on the application name on the _________ tab.
Host based firewall, exceptions
Of course , you can always purchase a _____-_____ firewall, and install it on your computer.
Third-party
A network based firewall, is a combination of ________ and ________. And it operates at the network _____, it is placed between a _______ network and the internet.
Hardware, and software
Layer
Private
Unlike a host based firewall, where it only protects its own computer, a network based firewall protects an ______ network.
Entire
Network based firewall protects an entire network through __________ rules that is applied to the entire network, so that any harmful activity can be _______, before it reaches the __________.
Management, stopped, computers
Firewalls inspect traffic in a couple of ways
(What are the two ways?)
-Stateful
-Stateless
Stateful firewall, monitors all the connections and ____ ______ that are passing through, and keeps a ______ of it.
Data streams, record
Stateless firewall, uses an ___ to allow or deny traffic.
ACL
Content filtering is a technology that is commonly used in _____.
As the name content filtering implies, it filters data based on their _______, and not on the ______.
Content , source
(Content Filtering) This type of filter is commonly used to filter ______ ____.
Email spam
And another type of filter is called s__________ I____________.
Signature identification
Signature identification is used to detect _______ that have a well-known ________ pattern.
Viruses, behavior
Certain viruses and _______ have a common behavior, and firewalls that use ___________ ____________ are programmed to spot this behavior. And once it’s spotted it takes action to _____ the intruder
Malware, signature, identification, block
Intrusion detection or prevention system (IDS/IPS) is a hardware tool that is typically placed between the ________ and the ________.
Internet , firewall
IDS/IPS job is to alert and prevent a network from _______ ______.
Outside attacks
IDS/IPS monitors traffic flowing through a _______, looking for suspicious patterns. If it finds any, alerts the network ____________ of a pending danger.
Network, administrator