Firewalls 4.5 Flashcards

1
Q

Network Based Firewalls

A
  • An appliance that sits in line with the organization;s network
  • Dictates what traffic is allowed or disallowed.
  • Filters traffic through the port numbers or the application.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Next-Generation Firewall (NGFW)

A
  • Inspects traffic by inspecting the source, the destination addresses, ports, and the content itself.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Open Systems Interconnection (OSI) Layers

A
  • A means of describing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewalls as Layer 3 Routers

A
  • Often sits on the ingress/egress of the network, or at the point where the inside network meets the outside network.
  • Performs routing functions that include networking addressing translation and dynamic routing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall Rules

A
  • A mirror of the policy constraints at a particular point in the network.
  • State whether a firewall should allow a particular traffic to pass through or block it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewalls Logical Path

A
  • Will start at the top of the list of rules
  • Will evaluate each rule until it matches
  • Specific rules are usually at the top.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Implicit Deny

A
  • Most firewall rules have a deny set of rules at the bottom.
  • If there is no match within rule based, the traffic is denied.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access Control List (ACL)

A
  • A list associated with an object.
  • Identifies the level of access.
  • Identifies what the object can do.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Screened Subnet

A
  • Previously known as a demilitarized zone
  • An area not owned by either side
  • An additional layer of security between the user and the internet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intrusion Prevention System

A
  • Usually integrated into an NGFW.
  • Has it’s own rule base.
  • Monitors traffic in real time.
  • Looks for a perfect match based on the signature of the incoming traffic.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly