Network Defence Flashcards

1
Q

What are firewalls?

A

Firewalls monitor and filters network traffic using DMZ, zone segregation, and can be implemented as hardware or software appliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are firewalls rules and policies?

A

They are set rules to tell a firewall what to do; eg. deny all incoming TCP traffic in all ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does firewall help?

A
  • Reduce port scanning as it can lock down port access

- Limit DoS/DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is packet filtering firewall?

A
  • Tests each packet that crosses the firewall according to a set of user-defined rules.
  • Has both stateless and stateful.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s the difference between stateless and stateful firewalls?

A
  • Stateless firewalls do not look at state of connections but just the packets itself.
  • Stateful firewalls maintains information about a user connections in a state table.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Network Intrusion Detection System?

A

NDIS detects unauthorized access to networks and host resources without needing traffic flow through it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are NIDS connected to networks?

A
  • Hubs: in promiscuous mode

- Switch: port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can NDIS do?

A
  • Monitor large scope
  • Able to support IoT networks via agents
  • Supports DPI
  • Signature-based or statistical anomaly detection
  • Used with IPS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Network Intrusion Prevention System?

A

Similar to NIDS but also provide automated responses to block intrusions and protect system against attacks.

It is located inbetween firewall and the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are proxy firewalls?

A

Application gateway that protects network resources by redirecting web requests at the application layer.

Scans for Layer 7 protocols like HTTP & FTP with DPI.

Provides private or anonymous internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are virtual private networks?

A

VPNs allows you to extend a private network across a public one such as the internet; hence encrypted and cannot be read.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three VPN subsystems?

A
  • Authentication: user must be authenticated to establish a secure tunnel.
  • Tunneling: encapsulation of one type of protocol packet within the datagram of a different protocol.
  • Encryption: to protect data travelling through the tunnel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some IPSec vulnerabilities?

A

Oracle attack can be used to bypass authentication and spoof clients & servers.

IKEv2 susceptible to offline dictionary attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some TLS VPN vulnerabilities?

A
  • MITM attack allows attacker to observe compression of information, the better the compression, the more accurate the password.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a honeypot?

A

It is a decoy (often a VM) that is designed to be intentionally vulnerable that should look like a production environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly