Firewalls Flashcards

1
Q

Firewall policies rarely concern themselves with the _______________ layer.

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NAT (is / is not) considered a firewall technology.

A

NAT is not considered a firewall technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The network(s) that is on a firewall’s internal interface is sometimes referred to as the ________ interface (or network).

A

protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(True / False) Most firewalls sold today provide stateful packet filtering.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The most common example of a pure packet filtering device is a router that employs _____________

A

Access Control Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_________ ______ being blocked by firewalls is a common cause of VPN interoperability issues.

A

Fragmented Packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

As a general rule, what should firewalls do with fragments?

a. Block them all
b. Permit them all
c. Reassemble them, then make the appropriate permit/deny decision
d. No general rule was provided, must consider on case-by-case basis.

A

d. No general rule was provided, must consider on case-by-case basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewalls become stateful and track the state of connections by incorporating greater awareness of the _________ layer.

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What specific transport layer information do you think (or know) the firewall will use/reference to gather information about the state of a connection?

A
  1. Flags
  2. Socket Pairs
  3. Seq Numbers
  4. Ack Numbers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is said with regard to stateful inspection of UDP traffic?

a. UDP traffic simply cannot be filtered statefully because it’s a connectionless protocol.
b. UDP traffic can be filtered statefully the same way as TCP traffic.
c. Stateful filters will use matching IPs and port numbers to filter UDP statefully.
d. Stateful filters will use flags in the UDP header to filter statefully.

A

c. Stateful filters will use matching IPs and port numbers to filter UDP statefully.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a stateful (non-application-level) firewall know when to remove a UDP (or other stateless protocol) session from its state table?

a. By observing the corresponding Fin/Ack session termination traffic.
b. By observing session payload information to determine when the transaction is complete.
c. By sending an ICMP message to the client to query for continued session usage.
d. It cannot know, and must resort to simple time-out.

A

d. It cannot know, and must resort to simple time-out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does a stateful, application-level, firewall know when to remove a DNS UDP (i.e., specific instance of UDP traffic) session from its state table?

a. By observing the corresponding Fin/Ack session termination traffic.
b. By observing session payload information to determine when the transaction is complete.
c. By sending an ICMP message to the client to query for continued session usage.
d. It cannot know, and must resort to simple time-out.

A

b. By observing session payload information to determine when the transaction is complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application firewalls are referred to by some vendors as deep packet inspection firewall. What is meant/implied by “deep” ?

A

That the firewall blocks content that is abnormal at the application layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Some application firewalls might employ a security-control feature that directly mitigates one of the principal threats for computer security: buffer overflow attacks. What is this security control?

A

Input Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

“Positivity” refers to the strategy of ensuring that the traffic/transactions involved in support of a particular protocol, follow the expected, (i.e. good, i.e. positive) behavior. This is in contrast to the (more typical) strategy of trying to identify all bad (“negative”) behavior. What is the term used for this concept?

A

RFC Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Firewall terminology—particularly with respect to capabilities—is quite confusing owing to differing names given to the same technology and differing technology descriptions given for the same technology name! I’ll have more to say on this in lecture. According to this section, what is/are the main distinction(s) between an application firewall (AF) and an application-proxy gateway (APG)?

a. APG better “isolates” the protected host, and can inspect encrypted traffic.
b. AF actually understands the application layer, whereas APG only looks for signatures.
c. APG will double as a Web cache server, whereas an AF won’t.
d. AFs can operate transparently, APG-based firewalls are by their nature non-transparent.

A

a. APG better “isolates” the protected host, and can inspect encrypted traffic.

17
Q

Aside from issues of traffic workload/throughput (affecting availability), which of these most succinctly addresses the main disadvantage of application-proxy gateways?

a. The requirement to have crypto keys installed.
b. “Generic agents”
c. The inability to install them in a manner that is transparent to the protected host(s).
d. The inability to require/check authentication of individual network users.

A

b. “Generic agents”

18
Q

Dedicated proxy servers are generally used to decrease firewall [the dedicated network firewall that is] workload and conduct __________________ filtering and __________________ that might be difficult to perform on the firewall itself.

A

Dedicated proxy servers are generally used to decrease firewall [the dedicated network firewall that is] workload and conduct SPECIALIZED filtering and LOGGING that might be difficult to perform on the firewall itself.

19
Q

The two most common VPN protocols are

a. SSL and L2TP
b. TLS and SSL
c. IPSec and SSL/TLS
d. IPSec and WPA

A

c. IPSec and SSL/TLS

20
Q

The two most common VPN architectures are

a. Authentication and Encryption
b. Site-to-site and end-to-end
c. Gateway-to-gateway and host-to-gateway
d. Tunneled and Direct

A

c. Gateway-to-gateway and host-to-gateway

21
Q

Many firewalls include _______________ _________________ for encryption to minimize the impact of VPN services. (FYI: this is very similar to previous lecture discussion regarding ASIC)

A

Hardware Acceleration

22
Q

What is NAC (Network Access Control)?

a. Just another fancy name for firewalling/filtering of network traffic.
b. Control of protected network access via more thorough ingress packet inspection.
c. A term used to describe a network that only permits access via VPN.
d. Limits network access contingent upon requestor’s “health check” and credentials.

A

d. Limits network access contingent upon requestor’s “health check” and credentials.

23
Q

All other things being equal… which of these would you think/intuit would be able to perform more reliable and accurate protection for a specific host (client or server)?

a. A network-based firewall
b. A host-based firewall

A

b. A host-based firewall

24
Q

What was the “bottom-line” security take-away regarding the use of UPnP?

a. It should be enabled for maximum security.
b. It should only be enabled for hosts that are being used remotely.
c. It should be off by default, due to risk of being subverted by a malicious application.
d. It should be on by default, then only de-activated if a known threat is discovered.

A

c. It should be off by default, due to risk of being subverted by a malicious application.

25
Q

Give the “classic” example where firewalls (aka “guards” or “diodes”) are used to permit traffic flow in only one direction.

A

LOW to HIGH transfer

26
Q

If NAT is configured to pinhole port 80 to the privately-addressed internal Web server (e.g., Web server’s IP is 10.10.10.7), then…

a. this Web server would not be allowed to communicate off of its network.
b. clients from outside this server’s network could reach it so long as they addressed their packets to the NAT router’s IP address and to port 80.
c. only clients in the same (private) network as the server could communicate with it.
d. the only external traffic that would be permitted into the private network would be that which was addressed to port 80.

A

b. clients from outside this server’s network could reach it so long as they addressed their packets to the NAT router’s IP address and to port 80.

27
Q

The typical usage for firewalls is the logical protection for an entire agency or organization from the rest of the “Internet”. This section addresses the use of firewalls for the logical protection (separation, isolating, filtering, POLPing, etc.) of different “domains” within an agency or organization. Which two examples of this were mentioned in this section of the SP800-41?
(choose 2)

a. Separation of internal users who have varying levels of trust.
b. Separating client networks from server networks.
c. Isolating unauthorized users from authorized users.
d. Isolating an organization’s visitor wireless subnet from the rest of its internal network.

A

a. Separation of internal users who have varying levels of trust.
d. Isolating an organization’s visitor wireless subnet from the rest of its internal network.

28
Q

This risk analysis should be based on an evaluation of ________, ____________, and _____________ in place to mitigate vulnerabilities; and the ___________ if systems or data are compromised. [All of the terms of the Risk Equation]

A

This risk analysis should be based on an evaluation of THREATS, VULNERABILITIES, and COUNTERMEASURES in place to mitigate vulnerabilities; and the IMPACT if systems or data are compromised.

29
Q

What is another (synonymous) term for countermeasures or safeguards?

A

Security Controls

30
Q

Which IPs or IP ranges should be filtered? Give three specific examples.

(1) _______________(Hint: “localhost”)
(2) _______________(Hint: the “I don’t have an IP” IP)
(3) _______________(Hint: “I couldn’t get an IP from DHCP IP, so I self-assigned one of these” IPs)

A

(1) 127.0.0.0 - 127.255.255.255
(Hint: “localhost”)

(2) 169.254.0.0 - 169.255.255.255
(Hint: the “I don’t have an IP” IP)

(3) 0.0.0.0
(Hint: “I couldn’t get an IP from DHCP IP, so I self-assigned one of these” IPs)

31
Q

The most prominent non-security benefit of HTTP proxies is ______ ___________ for increased speed and decreased bandwidth use.

A

Caching Webpages

32
Q

We can easily argue that caching can be considered a security benefit. Which of the three CIA Triad security objectives does it (or can it) support?

a. Confidentiality
b. Integrity
c. Availability

A

c. Availability

33
Q

Is defense-in-depth (D-I-D) deemed a waste of security time/effort; or is it considered by NIST to be a legitimate strategy for cyber defense? ( waste / legitimate )

A

legitimate

34
Q

Log analysis, particularly the cross-correlation of logs from multiple systems, is an important part of monitoring and problem/incident analysis. To make this endeavor more effective, all logged systems should __________ with an authoritative ______ source.

A

To make this endeavor more effective, all logged systems should SYNCHRONISE with an authoritative TIME source.

35
Q

Which of these is correct?

a. Lucky for us, all firewalls follow the same rules, and once we learn one, we know them all.
b. We can expect every firewall to check its ruleset in a top-down, sequential, manner.
c. All firewalls will check all deny rules before checking any permit rules.
d. We need to RTM every time as different ruleset processing methods are used by different vendors/systems, and we may introduce un-intended filtering errors if not careful.
(Note: RTM = Read The Manual)

A

d. We need to RTM every time as different ruleset processing methods are used by different vendors/systems, and we may introduce un-intended filtering errors if not careful.

36
Q

Self-documentation is an important part of IT/cyber maintenance and operations. It’s the boring, low-hanging fruit, that often gets ignored or insufficiently supported; but which can be of great benefit for the maintenance of “healthy” systems. Giving meaningful names to ACLs, vice assigning a random number is one of these. What is more granular notion of self-documentation?

A

Include a comment for each rule.