Information Assurance 4 Flashcards

1
Q
  • aka network firewall.
  • Used to filter traffic on a network.
  • Block malicious traffic requests and data packets while allowing legitimate traffic through.
A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

8 types of firewalls based on general structure and method

A
  1. packet-filtering firewall
  2. circuit-level gateway
  3. stateful inspection firewall
  4. application-level firewall
  5. next-gen firewall
  6. software firewall
  7. hardware firewall
  8. cloud firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • oldest firewall
  • designed to create checkpoints at individual routers or switches
A

packet-filtering firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • quickyly and easily approve or deny traffic
  • verifying transmission control protocol handshake
A

circuit-level gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • combination of packet-filtering and circuit-level gateway
  • offer higher level of protection of your business
A

Stateful Inspection Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • firewalls operate at application layer to filter traffic
  • cloud-based most of the time and establish traffic connections and examine data packets coming
A

Proxy Firewalls (Application-Level Gateways/Cloud Firewalls) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • time it was created into what makes it this kind of firewall
  • also use IPS –intrusion prevention systems – to stop network attacks
A

next generation firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • These are any firewalls installed on local devices.
  • The biggest draw for these in that they can create a useful, in-depth defense path.
  • Maintaining these on more than one device is not easy, though, so you may need more than one for each asset
A

Software firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • use physical appliances, and they act like a traffic router.
  • The intercept data packets before they are connected to a network server.
  • The weakness here is that they can be easily bypassed, which goes against your need for a firewall
A

Hardware Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • also called FaaS – firewalls as a service.
  • They often go hand in hand with proxy firewalls, and the most significant benefit to these is that they grow with your business.
  • They work to filter large amounts of traffic away from your company, where it’s malicious
A

cloud firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Models of Access Control

A
  1. mandatory access control
  2. discretionary access control
  3. role-based access control
  4. rule-based access control
  5. attribute-based access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

security model in which access rights are regulated by central authority based on multiple levels of security

A

Mandatory access control (MAC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

access control method which owners or admins set policies defining who or what is authorized to access the resource

A

discretionary access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

```

This is a widely used access control mechanism that restricts access to computer resources based on individuals or groups with defined business functions

A

Role-based access control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is a security model in which the system administrator defines the rules that govern access to resource objects

A

Rule-based access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is a methodology that manages access
rights by evaluating a set of rules, policies and relationships using the attributes of
users, systems and environmental condition

A

Attribute-based access control (ABAC)

16
Q

This is a widely used access control mechanism that restricts access to computer resources based on individuals or groups with defined
business functions

A

Role-based access control (RBAC)

17
Q

. This is a security model in which the system administrator defines the rules that govern access to resource objects. Often, these rules are based on conditions, such as time of day or location

A

Rule-based access control

18
Q

This is a methodology that manages access rights by evaluating a set of rules, policies and relationships using the attributes of users, systems and environmental condition

A

Attribute-based access control (ABAC).

19
Q

Is an encrypted connection over the internet from a device to a network.

A

Virtual Private Network (VPN)

20
Q

is the use of a program to screen and/or exclude to web pages or email deemed objectionable.

A

Content Filtering

21
Q

Types of Content Filtering

A
  1. Web Filter
  2. Email Filter
  3. Internet Filter
  4. Search Engine Filter
  5. Proxy Content Filtering
  6. DNS-based Content Filtering
22
Q

Types of VPNs

A
  1. remote access
  2. site-to-site
23
Q

corporate office to branch offices
over the Internet

A

Site-to-site

24
Q

VPN securely connects a device outside the corporate office

A

Remote access