Firewalls Flashcards

1
Q

Firewalls can stop hackers from breaking into your system

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewalls can stop internet traffic that appears to be from a legitimate source

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewalls can stop viruses and worms that spread through the internet

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewalls can stop spyware being put on your system

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewalls can stop viruses and worms that are spread through email

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lists the types of traffic authorized to pass through the firewall

A

Firewall access policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

________ is developed from the organization’s information security risk assessment and policy, and a broad specification of which traffic types the organization needs to support

A

Firewall access policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewalls cannot protect when

____ or ____

A

Traffic that does not cross it (routing around, internal traffic)

when misconfigured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware can disable:
A) Software Firewalls
B) Hardware Firewalls
C) Antivirus checkers

A

A & C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewalls can stop/control
A) Pings
B) Packet sniffing
C) Outbound network traffic

A

A & C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This type of firewall filtering makes decisions on a packet-by-packet basis

A

Packet Filtering (no state information is saved)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

________ is the simplest and most efficient type of firewall filtering

A

Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are packet filtering rules based on?

A

Information contained in the network packet

  • Source IP
  • Destination IP
  • Source & Dest transport level address
  • IP protocol field
  • interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 2 default policies of firewall packet filtering?

A

Discard (prohibit unless explicitly allowed)

Forward (permit unless explicitly forbidden) -> easier to manage, but less secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the advantages of a Packet Filtering firewall?

A
  • Simplicity

* Typically transparent to users and very fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the disadvantages of a Packet Filtering firewall?

A
  • Cannot protect against attacks that use application specific vulnerabilities
  • Limited logging functionality
  • Vulnerable to attacks and exploits that take advantage of TCP/IP
  • Susceptible to security breaches caused by improper configuration
17
Q

Packet filtering countermeasure:

_____ discard packets with an inside source address if the packet arrives on an external interface

A

IP Address spoofing countermeasure

18
Q

Packet filtering countermeasure:

____ discard all packets in which the source destination specifies the route

A

Source routing attacks countermeasure

19
Q

Packet filtering countermeasure:

_____ enforcing a rule that the first fragment of a packet must contain a predefined minimum amount of the transport header

A

Tiny fragment attack countermeasure

20
Q

Packet Filtering

In order for a fragmented packet to be successfully reassembled at the destination, each fragment must obey the following rules:

A) Must not share a common fragment identification number

B) Each fragment must say what place or offset is in the original unfragmented packet

C) Each fragment must tell the length of the data carried in the fragment

D) The fragment does not need to know whether more fragments follow this one

A

B & C

21
Q

a _______ firewall uses a connection state table

A

stateful inspection firewall

22
Q

______ acts as a relay of application level traffic (basically a man or system in the middle)

A

Application-level gateway (or application proxy)

23
Q

Application level gateways tend to be more secure than packet filters

A

true

24
Q

Application level gateways may restrict application features supported

A

true

25
Q

An Application level gateway can generically filter traffic for any application

A

False; must have proxy code for specific applications

26
Q

A packet filtering firewall is typically configured to filter packets going in both directions

A

true

27
Q

A prime disadvantage of an application-level gateway is the additional processing overhead on each connection

A

true

28
Q

A packet filtering firewall can decide if the current packet is allowed based on another packet it has just examined

A

false

29
Q

A stateful inspection firewall needs to keep track of information of an active connection in order to decide on the current packet

A

true

30
Q

A _______ serves as a platform for an application-level gateway, and is a system identified as a critical strong point in the network’s securty

A

bastion host

31
Q

__________ firewalls are used to secure an individual host

A

host based firewalls

32
Q

The primary role of a personal firewall is to ___________

A

deny unauthorized remote access

33
Q

______ hides the system from the internet by dropping unsolicited communication packets

A

stealth mode

34
Q

A company has a conventional firewall in place on its network. Which (if any) of these situations requires an additional personal firewall:

A) An employee uses a laptop on the company network and at home

B) An employee uses a desktop on the company network to access websites worldwide

C) A remote employee uses a desktop to create a VPN on the company’s secure network

D) None of the above, in each case the employee’s computer is protected by the company firewall

A

A & C

35
Q

Typically the systems in the _____ require or foster external connectivity such as the corporate web site, an e-mail server, or a DNS server

A) DMZ
B) IP protocol field
C) boundary firewall
D) VPN

A

A) DMZ

36
Q

A _______ configuration involves stand-alone firewall devices plus host-based firewalls working together under a central administrative control

A) packet filtering firewall
B) distributed firewall
C) Boundary firewall
D) VPN

A

B) distributed firewall