Firewalls Flashcards

1
Q

Firewall

A
  • A security device or software that monitors and controls incoming and outgoing network traffic
  • Acts as a barrier between trusted and untrusted networks, enforcing security policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network Firewall

A
  • Protects an entire network by controlling traffic between internal and external networks
  • Can be hardware-based (appliance) or software-based
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Host-Based Firewall

A
  • Installed on individual devices (hosts) to control traffic to and from that specific device.
  • Provides an additional layer of protection alongside network firewalls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet-Filtering Firewall

A
  • Examines packets of data and allows or denies them based on predetermined rules.
  • Filters based on source/destination IP addresses, port numbers, and protocol types
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stateful Firewall

A
  • Keeps track of the state of active connections
  • Allows incoming traffic only if it matches an established outgoing connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application Layer Firewall

A
  • Operates at the application layer (Layer 7) of the OSI model
  • Can analyze and control traffic based on specific applications or services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Proxy Firewall

A
  • Acts as an intermediary between clients and servers
  • Enhances security and provides anonymity by masking the clients IP address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unified Threat Management (UTM) firewall

A
  • Combines various security features in a single appliance
  • Includes firewall, intrusion detection/ prevention, antivirus, content filtering, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intrusion Detection System

A
  • Monitors and actively blocks or prevents malicious activities in real-time
  • Goes beyond detection and also takes action to stop threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access Control Lists

A
  • Rules that define what traffic is allowed or denied by the firewall
  • Based on source/destination IP addresses, port numbers, and protocol types
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Demilitarized Zone (DMZ)

A
  • A separate network segment that provides a buffer between the internal network and external networks
  • Used to host public-facing services like web servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Address Translation

A
  • Translates private IP addresses to a single public IP address
  • Enhances security by hiding internal network addresses from the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtual Private Network Firewall

A
  • Provides secure remote access to the network over an encrypted tunnel
  • protects data in transit and enables remote work
How well did you know this?
1
Not at all
2
3
4
5
Perfectly