Lesson 2 Flashcards

1
Q

Firewall operations are historically based on one of the following technologies

A
Packet filtering
–
Application
proxies
or
proxy servers
(not to be confused with
proxy
firewalls
)
–
Network Address Translation
–
Stateful packet inspection
–
Next
-
generation
context
-
aware firewalls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Resides at layer 3 & 4 of the OSI Stack

.

A

Packet Filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

________ or_________,are devices that operate as intermediary agents on behalf of clients that are on a private or protected network

A

Application proxies ,or proxy servers (typically Web proxies)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A _________is an Internet-facing proxy used to retrieve from a wide range of sources.

A

forward proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ___________ is usually an Internet-facing proxy used as a front-end to control and protect access to a server on a private network.A reverse proxy commonly also performs tasks such as load-balancing, authentication, decryption orcaching.

A

reverse proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Stateful Packet Filtering firewall maintains state information in a state table, referred to as a _________
.

A

connection table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can perform stateful packet inspection as well as application layer inspection.

A

Application - level Proxy Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A _____________ is a hardware - or software - based network security system that is able to detect and block sophisticated attacks by enforcing security policies at the application level, as well as at the port and protocol level.

A

next - generation firewall (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___________ firewalls provide granular control of applications, comprehensive user identification, and location - based control.

A

Context - aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_________ to secure TCP connections

________ for authenticating telnet, HTTP, and FTP connections

A

– Sequence Number Randomization ( SNR )

– Cut - through Proxy (CTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

All _________ through the appliance are denied unless specifically permitted.

A

ICMP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The reason is that once you configure an IP address on the appliance’s interface, the appliance automatically creates a static route for the specified network address and associates it with the configured interface. This is referred to as a ________

A

connected route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly