Lecture 6.5 Flashcards

1
Q

Technical controls – ?

Identify

Firewalls and VPN

A

essential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Technical controls – ?

Identify

Firewalls and VPN

A

essential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Enforcing policy for many ?

Identify

Firewalls and VPN

A

IT functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Not involve direct ?

Identify

Firewalls and VPN

A

human control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Improve organization’s ability to ?

Identify

Firewalls and VPN

A

balance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

?

Use data classification schemes

Identify

Firewalls and VPN - Access Control

A

Mandatory access control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

?

Give users and data owners limited control over access

Identify

Firewalls and VPN - Access Control

A

Mandatory access control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

?

Each collection of information is rated

Identify

Firewalls and VPN - Access Control

A

Data classification schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

?

Each user is rated

Identify

Firewalls and VPN - Access Control

A

Data classification schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

?

May use matrix or authorization

Identify

Firewalls and VPN - Access Control

A

Data classification schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

?

Managed by central authority

Identify

Firewalls and VPN - Access Control

A

Nondiscretionary controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

?

Tied to the role a user performs

Identify

Firewalls and VPN - Access Control

A

Role-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

?

Tied to a set of tasks user performs

Identify

Firewalls and VPN - Access Control

A

Task-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

?

Implemented at the option of the data user

Identify

Firewalls and VPN - Access Control

A

Discretionary access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

?

Used by peer to peer networks

Identify

Firewalls and VPN - Access Control

A

Discretionary access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

? ?? ??? ????

(4) All controls rely on

Enumerate

Firewalls and VPN - Access Control

A
  • Identification
  • Authentication
  • Authorization
  • Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unverified entity – ?

Identify

Firewalls and VPN - Access Control - Identification

A

supplicant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Seek access to a resource by ?

Identify

Firewalls and VPN - Access Control - Identification

A

label

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

?

is called an identifier

Identify

Firewalls and VPN - Access Control - Identification

A

Label

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Mapped to one & only one ?

Identify

Firewalls and VPN - Access Control - Identification

A

entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Authentication:
* Something a supplicant ?
* Something a supplicant ??
* Something a supplicant ???

Identify

Firewalls and VPN - Access Control - Authentication

A
  • knows
  • has
  • is
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Matches supplicant to ?

Identify

Firewalls and VPN - Access Control - Authorization

A

resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Often uses access control ?

Identify

Firewalls and VPN - Access Control - Authorization

A

matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

(3) Handled by 1 of 3 ways

Enumerate

Firewalls and VPN - Access Control - Authorization

A
  • Authorization for each authenticated users
  • Authorization for members of a group
  • Authorization across multiple systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Accountability known as **?** | Identify ## Footnote Firewalls and VPN - Access Control - Accountability
auditability
26
All actions on a system can be attributed to an authenticated **?** | Identify ## Footnote Firewalls and VPN - Access Control - Accountability
identity
27
System logs and **?** | Identify ## Footnote Firewalls and VPN - Access Control - Accountability
database journals
28
Prevent information from moving between the **?** and **??** | Identify ## Footnote Firewalls and VPN - Firewalls - Purpose
* outside world * inside world
29
# **?** untrusted network | Identify ## Footnote Firewalls and VPN - Firewalls - Purpose
Outside world
30
# **?** trusted network | Identify ## Footnote Firewalls and VPN - Firewalls - Purpose
Inside world
31
# **?** Five major categories | Enumerate ## Footnote Firewalls and VPN - Processing Mode
* Packet filtering * Application gateway * Circuit gateway * MAC layer * Hybrids
32
# **?** Filtering firewall | Identify ## Footnote Firewalls and VPN
Packet Filtering
33
# **?** Examine header information & data packets | Identify ## Footnote Firewalls and VPN
Packet Filtering
34
# **?** **??** **???** **????** **?????** (5) Installed on TCP/IP based network | Enumerate ## Footnote Firewalls and VPN - Packet Filtering
* Functions at the IP level * Drop a packet (deny) * Forward a packet (allow) * Action based on programmed rules * Examines each incoming packet
35
Inspect networks at the **?** | Identify ## Footnote Firewalls and VPN - Filtering Packets
network layer
36
Packet matching restriction = **?** | Identify ## Footnote Firewalls and VPN - Filtering Packets
deny movement
37
# **?** **??** **???** **????** (4) Restrictions most commonly implemented in Filtering Packets | Enumerate ## Footnote Firewalls and VPN - Filtering Packets
* IP source and destination addresses * Direction (incoming or outgoing) * Protocol * Transmission Control Protocol (TCP) or User Datagram Protocol (UD) source or destination
38
# **?** **Requires rules** to be developed and **installed with firewall** | Identify ## Footnote Firewalls and VPN - Packet Filtering Subsets
Static filtering
39
# **?** Allows only a **particular packet with a particular source**, destination, and port address to enter | Identify ## Footnote Firewalls and VPN - Packet Filtering Subsets
Dynamic filtering
40
# **?** Uses a state table | Identify ## Footnote Firewalls and VPN - Packet Filtering Subsets
Stateful
41
# **?** Tracks the state and context of each packet | Identify ## Footnote Firewalls and VPN - Packet Filtering Subsets
Stateful
42
# **?** Records which station sent what packet and when | Identify ## Footnote Firewalls and VPN - Packet Filtering Subsets
Stateful
43
# **?** Perform packet filtering but takes extra step | Identify ## Footnote Firewalls and VPN - Packet Filtering Subsets
Stateful
44
# **?** Can expedite responses to internal requests | Identify ## Footnote Firewalls and VPN - Packet Filtering Subsets
Stateful
45
# **?** Vulnerable to DOS attacks because of processing time required | Identify ## Footnote Firewalls and VPN - Packet Filtering Subsets
Stateful
46
# **?** **Installed on dedicated computer** | Identify ## Footnote Firewalls and VPN
Application Gateway
47
# **?** Used in **conjunction with filtering router** | Identify ## Footnote Firewalls and VPN
Application Gateway
48
# **?** Goes **between external request and webpage** | Identify ## Footnote Firewalls and VPN - Application Gateway
Proxy server
49
# **?** **Between trusted and untrusted network** | Identify ## Footnote Firewalls and VPN - Application Gateway - 1/4 ?
Resides in DMZ
50
# **?** Exposed to risk | Identify ## Footnote Firewalls and VPN - Application Gateway - 2/4 ?
Resides in DMZ
51
# **?** Can place additional filtering routers behind | Identify ## Footnote Firewalls and VPN - Application Gateway - 3/4 ?
Resides in DMZ
52
# **?** Restricted to a single application | Identify ## Footnote Firewalls and VPN - Application Gateway - 4/4 ?
Resides in DMZ
53
# **?** Operates at **transport level** | Identify ## Footnote Firewalls and VPN - 1/6 ?
Circuit Gateways
54
# **?** Authorization **based on addresses** | Identify ## Footnote Firewalls and VPN - 2/6 ?
Circuit Gateways
55
# **?** **Don’t look at traffic** between networks | Identify ## Footnote Firewalls and VPN - 3/6 ?
Circuit Gateways
56
# **?** Do **prevent direct connections** | Identify ## Footnote Firewalls and VPN - 4/6 ?
Circuit Gateways
57
# **?** **Create tunnels** between networks | Identify ## Footnote Firewalls and VPN - 5/6 ?
Circuit Gateways
58
# **?** Only **allowed traffic can use tunnels** | Identify ## Footnote Firewalls and VPN - 6/6 ?
Circuit Gateways
59
# **?** Designed to operate at **media access sublayer** | Identify ## Footnote Firewalls and VPN - 1/3 ?
MAC Layer Firewalls
60
# **?** Able to **consider specific host computer identity** in filtering | Identify ## Footnote Firewalls and VPN - 2/3 ?
MAC Layer Firewalls
61
# **?** **Allows specific types of packets that are acceptable** to each host | Identify ## Footnote Firewalls and VPN - 3/3 ?
MAC Layer Firewalls
62
# **?** **??** **???** **????** **?????** **??????** **???????** (7) OSI Model | Enumerate ## Footnote Firewalls and VPN
1. Physical 2. Data 3. Network 4. Transport 5. Session 6. Presentation 7. Application
63
# **?** **Combine elements of other types of firewalls**; i.e., elements of packet filtering and proxy services, or of packet filtering and circuit gateways | Identify ## Footnote Firewalls and VPN - 1/2 ?
Hybrid Firewalls
64
# **?** **Alternately, may consist of two separate firewall devices**; each a separate firewall system, but are connected to work in tandem | Identify ## Footnote Firewalls and VPN - 2/2 ?
Hybrid Firewalls
65
# **?** **Static** packet filtering | Identify ## Footnote Firewalls and VPN - Categorization by Development Generation - 1/3 ?
First Generation
66
# **?** **Simple** networking devices | Identify ## Footnote Firewalls and VPN - Categorization by Development Generation - 2/3 ?
First Generation
67
# **?** Filter packets **according to their headers** | Identify ## Footnote Firewalls and VPN - Categorization by Development Generation - 3/3 ?
First Generation
68
# **?** **Application level** or proxy servers | Identify ## Footnote Firewalls and VPN - Categorization by Development Generation - 1/3 ?
Second Generation
69
# **?** **Dedicated** systems | Identify ## Footnote Firewalls and VPN - Categorization by Development Generation - 2/3 ?
Second Generation
70
# **?** Provides **intermediate services** for the requestors | Identify ## Footnote Firewalls and VPN - Categorization by Development Generation - 3/3 ?
Second Generation
71
# **?** **Stateful** | Identify ## Footnote Firewalls and VPN - Categorization by Development Generation - 1/2 ?
Third Generation
72
# **?** Uses **state tables** | Identify ## Footnote Firewalls and VPN - Categorization by Development Generation - 2/2 ?
Third Generation
73
# **?** **Dynamic** filtering | Identify ## Footnote Firewalls and VPN - Categorization by Development Generation - 1/2 ?
Fourth Generation
74
# **?** **Particular packet with a particular source**, destination, and port address to enter | Identify ## Footnote Firewalls and VPN - Categorization by Development Generation - 2/2 ?
Fourth Generation
75
# **?** Kernel proxy | Identify ## Footnote Firewalls and VPN - Categorization by Development Generation - 1/4 ?
Fifth Generation
76
# **?** Works un the **Windows NT Executive** | Identify ## Footnote Firewalls and VPN - Categorization by Development Generation - 2/4 ?
Fifth Generation
77
# **?** Evaluates at **multiple layers** | Identify ## Footnote Firewalls and VPN - Categorization by Development Generation - 3/4 ?
Fifth Generation
78
# **?** Checks security as packet **passes from one level to another** | Identify ## Footnote Firewalls and VPN - Categorization by Development Generation - 4/4 ?
Fifth Generation
79
# **?** State-alone | Identify ## Footnote Firewalls and VPN - Categorized by Structure - 1/3 ?
Commercial-Grade
80
# **?** Combination of hardware and software | Identify ## Footnote Firewalls and VPN - Categorized by Structure - 2/3 ?
Commercial-Grade
81
# **?** Many of features of stand alone computer | Identify ## Footnote Firewalls and VPN - Categorized by Structure - 3/3 ?
Commercial-Grade
82
# **?** Configured application software | Identify ## Footnote Firewalls and VPN - Categorized by Structure - 1/2 ?
Commercial-Grade Firewall Systems
83
# **?** Runs on general-purpose computer | Identify ## Footnote Firewalls and VPN - Categorized by Structure - 2/2 ?
Commercial-Grade Firewall Systems
84
# **?** **??** (2) Runs on general-purpose computer | Enumerate ## Footnote Firewalls and VPN - Categorized by Structure - Runs on general-purpose computer
* Existing computer * Dedicated computer
85
# **?** Broadband gateways or DSL/cable modem routers | Identify ## Footnote Firewalls and VPN - Categorized by Structure - 1/6 ?
Small Office/Home Office (SOHO)
86
# **?** First – stateful | Identify ## Footnote Firewalls and VPN - Categorized by Structure - 2/6 ?
Small Office/Home Office (SOHO)
87
# **?** Many newer one – packet filtering | Identify ## Footnote Firewalls and VPN - Categorized by Structure - 3/6 ?
Small Office/Home Office (SOHO)
88
# **?** Can be configured by use | Identify ## Footnote Firewalls and VPN - Categorized by Structure - 4/6 ?
Small Office/Home Office (SOHO)
89
# **?** Router devices with WAP and stackable LAN switches | Identify ## Footnote Firewalls and VPN - Categorized by Structure - 5/6 ?
Small Office/Home Office (SOHO)
90
# **?** Some include intrusion detection | Identify ## Footnote Firewalls and VPN - Categorized by Structure - 6/6 ?
Small Office/Home Office (SOHO)
91
# **?** Installed directly on user’s system | Identify ## Footnote Firewalls and VPN - Categorized by Structure - 1/3 ?
Residential
92
# **?** Many free version not fully functional | Identify ## Footnote Firewalls and VPN - Categorized by Structure - 2/3 ?
Residential
93
# **?** Limited protection | Identify ## Footnote Firewalls and VPN - Categorized by Structure - 3/3 ?
Residential
94
# **?** Lacks auditing and strong authentication | Identify ## Footnote Firewalls and VPN - Firewall Architectures - 1/2 ?
Packet filtering routers
95
# **?** Can degrade network performance | Identify ## Footnote Firewalls and VPN - Firewall Architectures - 2/2 ?
Packet filtering routers
96
# **?** **Combines packet filtering router** with **dedicated firewall** – such as proxy server | Identify ## Footnote Firewalls and VPN - Firewall Architectures - 1/3 ?
Screened Host firewall
97
# **?** * Allows router to **prescreen packets** * **Application proxy examines** at application layer | Identify ## Footnote Firewalls and VPN - Firewall Architectures - 2/3 ?
Screened Host firewall
98
# **?** * Separate host – **bastion or sacrificial host** * **Requires external attack** to compromise 2 separate systems. | Identify ## Footnote Firewalls and VPN - Firewall Architectures - 3/3 ?
Screened Host firewall
99
# **?** Two network interface cards | Identify ## Footnote Firewalls and VPN - Firewall Architectures
Dual Homed Host
100
# **?** * **Dominant architecture used today** * Provides **DMZ** | Identify ## Footnote Firewalls and VPN - Firewall Architectures
Screened Subnet Firewalls (with DMZ)
101
# **?** **Protocol for handling TCP** traffic through a **proxy server** | Identify ## Footnote Firewalls and VPN - Firewall Architectures - 1/3 ?
SOCS Servers
102
# **?** **Proprietary circuit-level proxy server** | Identify ## Footnote Firewalls and VPN - Firewall Architectures - 2/3 ?
SOCS Servers
103
# **?** Places special **SOCS** client-side agents on each workstation | Identify ## Footnote Firewalls and VPN - Firewall Architectures - 3/3 ?
SOCS Servers
104
# **?** Extent to which the **firewall design provides the required protection** | Identify ## Footnote Firewalls and VPN - Selecting the Right Firewall
Most important factor
105
# **?** Cost | Identify ## Footnote Firewalls and VPN - Selecting the Right Firewall
Second most important factor
106
# **?** **Software filter—not a firewall**—that allows administrators to **restrict content access** from within network | Identify ## Footnote Firewalls and VPN - 1/4 ?
Content Filters
107
# **?** **Essentially a set of scripts** or programs**restricting user access to certain networking protocols**/Internet locations | Identify ## Footnote Firewalls and VPN - 2/4 ?
Content Filters
108
# **?** Primary focus to **restrict internal access to external material** | Identify ## Footnote Firewalls and VPN - 3/4 ?
Content Filters
109
# **?** Most common **content filters** restrict users from accessing non-business Web sites or deny incoming span | Identify ## Footnote Firewalls and VPN - 4/4 ?
Content Filters
110
# **?** **Installing internetwork connections requires leased lines** or other data channels; **these connections usually secured under requirements** of formal service agreement | Identify ## Footnote Firewalls and VPN
Protecting Remote Connections
111
# **?** Unsecured, **dial-up** connection points represent a substantial exposure to attack | Identify ## Footnote Firewalls and VPN - Protecting Remote Connections
Dial-Up
112
# **?** : automatic phone-dialing program that **dials every number in a configured range** and **records number if modem picks up** | Identify ## Footnote Firewalls and VPN - Protecting Remote Connections - Dial-Up
War dialer
113
# **?** **??** (2) Authentication Systems | Enumerate ## Footnote Firewalls and VPN - Protecting Remote Connections - Authentication systems
* RADIUS AND TACACS * Kerberos
114
# **?** Access control for dial-up | Identify ## Footnote Firewalls and VPN - Protecting Remote Connections - 1/2 Authentication systems
RADIUS AND TACACS
115
# **?** * **Symmetric key encryption** to validate * Keeps a **database containing the private keys** | Identify ## Footnote Firewalls and VPN - Protecting Remote Connections - 2/2 Authentication systems 1/2 ?
Kerberos
116
# **?** * **Both networks and clients** have to **register** * Does the authentication **based on database** | Identify ## Footnote Firewalls and VPN - Protecting Remote Connections - 2/2 Authentication systems 2/2 ?
Kerberos
117
# **?** * Secure European System for applications in Multiple vendor Environment * **Similar to Kerberos** | Identify ## Footnote Firewalls and VPN - Protecting Remote Connections
Sesame
118
# **?** Implementation of cryptographic technology | Identify ## Footnote Firewalls and VPN - Protecting Remote Connections
VPN
119
# **? ?? ???** (3) Private and secure network connection | Enumerate ## Footnote Firewalls and VPN - Protecting Remote Connections - VPN
* Trusted VPN * Secure VPN * Hybrid VPN
120
# **?** **Data within IP packet is encrypted**, but **header information is not** | Identify ## Footnote Firewalls and VPN - 1/2 ?
Transport Mode
121
# **?** **Allows user to establish secure link** directly with remote host, **encrypting only data contents** of packet | Identify ## Footnote Firewalls and VPN - 2/2 ?
Transport Mode
122
# **?** Organization establishes two perimeter **tunnel servers** | Identify ## Footnote Firewalls and VPN - 1/3 ?
Tunnel Mode
123
# **?** These servers act as encryption points, **encrypting all traffic that will traverse unsecured network** | Identify ## Footnote Firewalls and VPN - 2/3 ?
Tunnel Mode
124
# **?** Primary benefit to this model is that an **intercepted packet reveals nothing** about true destination system | Identify ## Footnote Firewalls and VPN - 3/3 ?
Tunnel Mode