Firewalls and NAT Flashcards

1
Q

Firewall

A

A device that monitors and filters incoming and outgoing network traffic based on established security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewall Objectives

A

Service control
Behavior control
User/machine control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Service Control

A

What services can be accessed (in or outbound)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Behavior control

A

How services are accessed (e.g. spam filtering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

User/machine control

A

Controls access to services on a per-user/machine level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Default deny (aka blocklist)

A

Denylist that specifies connectivity that is explicitly disallowed
Less secure, but allows functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Default accept

A

Specifies connectivity that is explicitly allowed
More secure, but may break functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

First Match Approach

A

Policies are evaluated until the packet matches a rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Best Match Approach

A

Apply the “most specific” matching rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stateless

A

Each packet considered in isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stateful

A

Allows historical context consideration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stateless (Pro and Cons)

A

Pro: much faster processing
Con:
1) more complex rule specification
2) less secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stateful (Pros and Cons)

A

Pro:
1) more simple rule specification
2) more secure
Con: slower processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

De-Militarized Zone (DMZ)

A

A physical or logical subnetwork that contains and exposes an organization’s external-facing service to an untrusted, usually larger, network such as the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Honeypots

A

Decoy systems to lure potential attackers
1) divert attackers from critical systems
2) collect information about attacker’s activity
3) delay attacker for enough time to respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Honeypot (Outside Firewall)

A

Can detect an attempted connection to unused IP addresses

17
Q

Honeypot (Inside Firewall)

A

Catches internal attacks that detect firewall misconfigurations/vulnerabilities