Firewalls Flashcards
Firewall policies rarely concern themselves with the _______________ layer.
Data Link Layer
NAT (is / is not) considered a firewall technology.
NAT is not considered a firewall technology.
The network(s) that is on a firewall’s internal interface is sometimes referred to as the ________ interface (or network).
protected
(True / False) Most firewalls sold today provide stateful packet filtering.
True
The most common example of a pure packet filtering device is a router that employs _____________
Access Control Lists
_________ ______ being blocked by firewalls is a common cause of VPN interoperability issues.
Fragmented Packets
As a general rule, what should firewalls do with fragments?
a. Block them all
b. Permit them all
c. Reassemble them, then make the appropriate permit/deny decision
d. No general rule was provided, must consider on case-by-case basis.
d. No general rule was provided, must consider on case-by-case basis.
Firewalls become stateful and track the state of connections by incorporating greater awareness of the _________ layer.
Transport
What specific transport layer information do you think (or know) the firewall will use/reference to gather information about the state of a connection?
- Flags
- Socket Pairs
- Seq Numbers
- Ack Numbers
What is said with regard to stateful inspection of UDP traffic?
a. UDP traffic simply cannot be filtered statefully because it’s a connectionless protocol.
b. UDP traffic can be filtered statefully the same way as TCP traffic.
c. Stateful filters will use matching IPs and port numbers to filter UDP statefully.
d. Stateful filters will use flags in the UDP header to filter statefully.
c. Stateful filters will use matching IPs and port numbers to filter UDP statefully.
How does a stateful (non-application-level) firewall know when to remove a UDP (or other stateless protocol) session from its state table?
a. By observing the corresponding Fin/Ack session termination traffic.
b. By observing session payload information to determine when the transaction is complete.
c. By sending an ICMP message to the client to query for continued session usage.
d. It cannot know, and must resort to simple time-out.
d. It cannot know, and must resort to simple time-out.
How does a stateful, application-level, firewall know when to remove a DNS UDP (i.e., specific instance of UDP traffic) session from its state table?
a. By observing the corresponding Fin/Ack session termination traffic.
b. By observing session payload information to determine when the transaction is complete.
c. By sending an ICMP message to the client to query for continued session usage.
d. It cannot know, and must resort to simple time-out.
b. By observing session payload information to determine when the transaction is complete.
Application firewalls are referred to by some vendors as deep packet inspection firewall. What is meant/implied by “deep” ?
That the firewall blocks content that is abnormal at the application layer.
Some application firewalls might employ a security-control feature that directly mitigates one of the principal threats for computer security: buffer overflow attacks. What is this security control?
Input Validation
“Positivity” refers to the strategy of ensuring that the traffic/transactions involved in support of a particular protocol, follow the expected, (i.e. good, i.e. positive) behavior. This is in contrast to the (more typical) strategy of trying to identify all bad (“negative”) behavior. What is the term used for this concept?
RFC Compliance