Firewalls and Tunnels Flashcards

1
Q

What is the purpose of a firewall?

A

To filter network traffic based on predefined policies, separating trusted and untrusted networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two main firewall strategies?

A

Default-deny: Block all traffic unless explicitly allowed.
Default-allow: Allow all traffic except what is explicitly blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name three reasons why firewalls are necessary.

A
  1. Prevent unauthorized access to vulnerable services.
  2. Control outgoing traffic and data exfiltration.
  3. Log network activity for troubleshooting and forensics.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is stateless filtering?

A

Filtering packets based on static rules without maintaining connection state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do stateful firewalls work?

A

They track the state of active connections and make decisions based on the context of packets in a session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are application-level firewalls?

A

Firewalls that filter traffic specific to applications, such as HTTP-level filtering for URLs or ads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a host-based firewall?

A

A firewall installed on individual devices to protect them from local threats or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why might a firewall need dynamic updates?

A

To respond to ongoing threats like DDoS attacks or handle protocols with dynamically negotiated ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the limitations of stateless firewalls?

A

They cannot track connection states, making them ineffective for dynamic or fragmented traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does ACK scanning reveal about firewalls?

A

It can determine if a stateless firewall is in use by observing the response to out-of-sync ACK packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Network Address Translation (NAT) do?

A

Remaps private IP addresses to a single public IP address for internet access, effectively acting as a default firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does NAT differ from stateful firewalls?

A

NAT modifies packet headers for address translation but does not fully track higher-layer states like stateful firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a Virtual Private Network (VPN) do?

A

Creates encrypted tunnels over untrusted networks to securely connect remote hosts to private networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name three common VPN technologies.

A
  1. PPTP: Layer 2, now considered insecure.
  2. IPsec: Layer 3, OS-level support, transparent to applications.
  3. SSL: Application-layer, used by OpenVPN.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the risks of using third-party VPN services?

A

They can monitor traffic, monetize user data, and are subject to local laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the functions of proxies?

A

Intermediate “stepping stones” for filtering traffic.
Used for HTTP caching, reverse proxies, and transcoding.

17
Q

What is a SOCKS proxy?

A

A protocol for generic packet forwarding, supporting multiple application types like HTTP, FTP, and SMTP.

18
Q

What is port forwarding, and how is it used?

A

Redirecting traffic from one port to another, often to bypass firewalls or allow external access to internal services.

19
Q

What is the key principle of Zero Trust architecture?

A

“Never trust, always verify”—treating all users, devices, and networks as potentially compromised.

20
Q

Name three principles of Zero Trust architecture.

A
  1. Continuous authentication and authorization.
  2. Micro-segmentation to prevent lateral movement.
  3. Encrypted communication for all traffic.
21
Q

What is BeyondCorp?

A

Google’s implementation of Zero Trust, shifting access control from the network perimeter to individual users.

22
Q

What is the purpose of the iptables command?

A

To configure host-based firewalls by defining rules for incoming and outgoing traffic.

23
Q

What does this command do?
iptables -A INPUT -p tcp –dport 22 -j ACCEPT

A

Allows incoming TCP traffic on port 22 (SSH).

24
Q

Why are traditional firewalls less effective in modern environments?

A

Internal devices can still be compromised, and BYOD/work-from-anywhere scenarios blur network boundaries.

25
Q

What is an alternative to relying on network firewalls?

A

Treat internal networks as untrusted and focus on securing individual users and devices.