Lesson 11: Network Security Devices Flashcards
What might cause proxy settings to be reconfigured without user interaction?
Malware/ spyware
How can you access windows firewall?
Control panel - System and Security
What would you use to configure a port-based rule in Windows 7?
Firewall advanced settings
What is the port number for remote desktop protocol?
3389
How will a user know whether the Windows Firewall is disabled on Windows 7?
The bottom right hand side will tell you with a notification, a flag with a X if its windows 7
What is used to allow internet access to an internal web server through a firewall?
Port forwarding
What is a DoS?
Denial of Service. Is an attack from one computer to another. The goal is to disrupt the normal operation so that the computer can’t provide service to users.
What is a DDoS?
Distributed denial of Service. This is a DoS attack from multiple attackers at once. Botnets are frequently used to attack targets with thouzands of zombie computers.
What is a Network-based firewall?
Controls traffic allowed in or out of the network. This can be a dedicated appliance that’s acts as only a firewall or it can be another device such as a router that has firewall capabilities.
What is a Host-based firewall?
This is a software running on a computer or host. Windows based systems has the windows firewall, which is a control panel applet running in windows and many third party applications are also available.
What is a DMZ?
Demilitarized zone. Is a buffer zone that provides a layer of security protection. Most commonly used for Internet facing servers and normally uses 2 firewalls. Buffer zones are placed between the Internet and the internal network so there is no risk.
What is Port Forwarding?
Supported with routers and firewalls. This allows traffic from the Internet to be forwarded to an internal system. Without port forwarding clients can’t access this internal system.
What is Port Triggering?
Used to open an incoming port in response to traffic on an outgoing port. The incoming port is normally closed and will close again a short while after the session is closed.
What are Proxy servers?
Used in many networks to control Internet traffic. Commonly used with HTTP and HTTPS( Hypertext transfer protocol secure) but can be used with other protocols such as FTP ( File transfer protocol)
What is a QoS?
Quality of Service. You use rules but associate it with QoS. Then assign either a bandwidth for the traffic or priority. E.g when VoIP is not clear there isn’t enough bandwidth. When using it you would give VoIP a higher priority to minimize this problem.