Module 6.1 Flashcards

1
Q

A system, or group of systems, that enforces an access control policy between networks.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Firewalls are resistant to network attacks.
  • Firewalls are the only transit point between internal corporate networks and external networks because all traffic flows through the firewall.
  • Firewalls enforce the access control policy.
A

Common Firewall Properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • They prevent the exposure of sensitive hosts, resources, and applications to untrusted users.
  • They sanitize protocol flow, which prevents the exploitation of protocol flaws.
  • They block malicious data from servers and clients.
  • They reduce security management complexity by off-loading most of the network access control to a few firewalls in the network.
A

Firewall Benefits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • A misconfigured firewall can have serious consequences for the network, such as becoming a single point of failure.
  • The data from many applications cannot be passed over firewalls securely.
  • Users might proactively search for ways around the firewall to receive blocked material, which exposes the network to potential attack.
  • Network performance can slow down.
  • Unauthorized traffic can be tunneled or hidden as legitimate traffic through the firewall.
A

Firewall Limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A firewall design where there is typically one inside interface connected to the private network, one outside interface connected to the public network

A

Demilitarized Zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Typical firewall DMZ configuration:

  • Traffic originating from the private network is permitted and inspected as it travels toward the public network. Inspected traffic returning from the public network and associated with traffic that originated from the private network is permitted.
  • Traffic originating from the public network and traveling to the private network is generally blocked.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Use zones to provide additional flexibility. A zone is a group of one or more interfaces that have similar functions or features. Zones are used to specify where a Cisco IOS firewall rule or policy should be applied.

A

Zone-Based Policy Firewalls (ZPFs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Four common types of firewalls are:

A
  • Packet Filtering (Stateless) Firewall
  • Stateful Firewall
  • Application Gateway Firewall
  • Next Generation Firewalls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Usually part of a router firewall, which permits or denies traffic based on Layer 3 and Layer 4 information.

A

Packet Filtering (Stateless) Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provide packet filtering by using connection information maintained in a state table. It analyzes traffic at OSI Layer 3 through 5.

A

Stateful Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Filters information at Layers 3, 4, 5, and 7 of the OSI model. Most of the firewall control and filtering is done in software.

A

Application Gateway Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Go beyond stateful firewalls by providing integrated intrusion prevention, application awareness and control, upgrade paths to include future information feeds, and techniques to address evolving security threats.

A

Next Generation Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A PC or server with firewall software running on it.

A

Host-based (server and personal) firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Filters IP traffic between a pair of bridged interfaces.

A

Transparent firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A combination of the various firewall types.

A

Hybrid firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advantages

  • No Impact on network (latency, jitter)
  • No Network impact if there is a sensor failure
  • No network impact if there is sensor overload

Disadvantages

  • Response action cannot stop trigger packets
  • Correct tuning required for response actions
  • More vulnerable to network security evasion techniques
17
Q

Advantages

  • Stops trigger packets
  • Can use stream normalization techniques

Disadvantages

  • Sensor issues might affect network traffic
  • Sensor overloading impacts the network
  • Some impact on network (latency, jitter)
18
Q

Two kinds of IPS

A

host-based IPS (HIPS) and network-based IPS.

19
Q
  • Software installed on a host to monitor and analyze suspicious activity.
  • Can monitor abnormal activity and prevent the host from executing commands that do not match typical behavior
  • Network traffic can also be monitored to prevent the host from participating in a denial-of-service
    (DoS) attack or being part of an illicit FTP session.
A

Host-based IPS (HIPS)

20
Q
  • Can be implemented using a dedicated or non-dedicated IPS device.
  • Implementations are a critical component of intrusion prevention.
  • There are host-based IDS/IPS solutions, but these must be integrated with a network-based IPS implementation to ensure a robust security architecture.
  • Sensors detect malicious and unauthorized activity in real-time and can act when required.
A

Network-based IPS

21
Q

What are the Specialized Security Appliances?

A
  • Cisco Advanced Malware Protection (AMP)
  • Cisco Web Security Appliance (WSA)
  • Cisco Email Security Appliance (ESA)
22
Q
  • An enterprise-class advanced malware analysis and protection solution
  • Provides comprehensive malware protection for organizations before, during, and after an attack
  • Accesses the collective security intelligence of the Cisco Talos Security Intelligence and Research Group
A

Cisco Advanced Malware Protection (AMP)

23
Q
  • A secure web gateway that combines leading protections to help organizations address the growing challenges of securing and controlling web traffic
  • Protects the network by automatically blocking risky sites and testing unknown sites before allowing users to access them
  • Provides malware protection, application visibility and control, acceptable use policy controls, insightful reporting, and secure mobility
A

Web Security Appliance (WSA)

24
Q
  • Defends mission-critical email systems
  • Constantly updated by real-time feeds from the Cisco Talos
  • Features include spam blocking, advanced malware protection, and outbound message control
A

Cisco Email Security Appliance (ESA)