Module 4 / Unit 4 Network Security Appliances Flashcards

On completion of this unit, you will be able to: □ Deploy and configure a firewall and troubleshoot security issues using tools such as iptables. □ Understand the uses for advanced security devices, such as IDS, UTM, and NGFW. □ Understand different types of DDoS attacks.

1
Q

What parameters can a layer 3 firewall ruleset use?

A

IP source and destination address, protocol type, and port number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the default rule on a firewall?

A

Deny anything not permitted by the preceding rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

hat OSI layer does an NGFW work at and why?

A

OSI layer 7 (application) because the Next Generation FireWall (NGFW) is configured with application-specific filters that can parse the contents of protocols such as HTTP, SMTP, or FTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of software would you use to protect a web server against applicationlevel attacks?

A

Host-based or application-based firewall / intrusion protection system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Using iptables, in which chain would you create rules to block all outgoing traffic not meeting certain exceptions?

A

OUTPUT chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are troubleshooting a connectivity problem with a network application server. Certain clients cannot connect to the service port. How could you rule out a network or remote client host firewall as the cause of the problem?

A

Connect to or scan the service port from the same segment with no host firewall running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Other than attempting to block access to sites based on content, what other security options might be offered by internet content filters?

A

Blocking access based on time of day or total usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why would you deploy a reverse proxy?

A

To publish a web application without exposing the servers on the internal network to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What sort of maintenance must be performed on signature-based monitoring software?

A

Definition / signature updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are most network DoS attacks distributed?

A

Most attacks depend on overwhelming the victim. This typically requires a large number of hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly