Lesson 11: Network Security Devices Flashcards

1
Q

What might cause proxy settings to be reconfigured without user interaction?

A

Malware/ spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can you access windows firewall?

A

Control panel - System and Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What would you use to configure a port-based rule in Windows 7?

A

Firewall advanced settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the port number for remote desktop protocol?

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How will a user know whether the Windows Firewall is disabled on Windows 7?

A

The bottom right hand side will tell you with a notification, a flag with a X if its windows 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is used to allow internet access to an internal web server through a firewall?

A

Port forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a DoS?

A

Denial of Service. Is an attack from one computer to another. The goal is to disrupt the normal operation so that the computer can’t provide service to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a DDoS?

A

Distributed denial of Service. This is a DoS attack from multiple attackers at once. Botnets are frequently used to attack targets with thouzands of zombie computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Network-based firewall?

A

Controls traffic allowed in or out of the network. This can be a dedicated appliance that’s acts as only a firewall or it can be another device such as a router that has firewall capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Host-based firewall?

A

This is a software running on a computer or host. Windows based systems has the windows firewall, which is a control panel applet running in windows and many third party applications are also available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a DMZ?

A

Demilitarized zone. Is a buffer zone that provides a layer of security protection. Most commonly used for Internet facing servers and normally uses 2 firewalls. Buffer zones are placed between the Internet and the internal network so there is no risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Port Forwarding?

A

Supported with routers and firewalls. This allows traffic from the Internet to be forwarded to an internal system. Without port forwarding clients can’t access this internal system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Port Triggering?

A

Used to open an incoming port in response to traffic on an outgoing port. The incoming port is normally closed and will close again a short while after the session is closed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Proxy servers?

A

Used in many networks to control Internet traffic. Commonly used with HTTP and HTTPS( Hypertext transfer protocol secure) but can be used with other protocols such as FTP ( File transfer protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a QoS?

A

Quality of Service. You use rules but associate it with QoS. Then assign either a bandwidth for the traffic or priority. E.g when VoIP is not clear there isn’t enough bandwidth. When using it you would give VoIP a higher priority to minimize this problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Netsh?

A

A shell command that has multiple layers.

17
Q

What is a firewall?

A

A firewall controls what traffic is allowed into or out of a network.

18
Q

How does Proxy server content filtering work?

A

It filters traffic based on URLs and blocks access to malicious websites.

19
Q

What is Malicious software ( malware) filtering?

A

Filters all traffic and detects and blocks malicious software.

20
Q

What does Spam filtering do?

A

Ability to detect and block spams before it reaches the user.

21
Q

What are IDSs (Intrusion Detection Systems)?

A

Monitor traffic and detects attacks and includes a notification system to provide alerts when an attack is detected.

22
Q

What are IPSs(Intrusion Prevention Systems)?

A

Extension of IDSs and can prevent attacks placed in line with traffic to block malicious traffic before it reaches the network.

23
Q

What is a NAC?

A

Network Access Control. Clients are inspected to ensure they meet certain requirements before access is granted. E.g a VPN client will be inspected to ensure it has up-to-date antivirus software before it is granted full VPN access.