Section 12: Perimeter Security Flashcards

1
Q

Perimeter Security

A

Boundary that separates the LAN from the WAN and how to secure that

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewalls

A

Screen traffic between two portions of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Three main types of firewalls

A

Hardware based, software based, and embedded (SOHO router, UTM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet Filtering

A

Inspects each packet passing through the firewall and accepts or rejects it based on the rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stateless Packet Filtering

A

Filtering based on IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stateful Packet Filtering

A

Tracks the request leaving the network (eliminates IP spoofing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NAT Filtering

A

Filters traffic based upon the ports being utilized and type of connection (TCP or UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Circuit Level Gateway

A

Operates at the session layer and only inspects the traffic during the establishment of the initial session for TCP or UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explicit Allow

A

Allows because you’ve specifically created a rule for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explicit Deny

A

Traffic is denied because the rules says so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Implicit Deny

A

Traffic is denied the ability to enter or leave the network because there is no specific rules that allows it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Web Application Firewall

A

Firewall installed to protect your server by inspecting traffic being sent to a web application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Proxy Server

A

A device that acts as a middle man between a device and a remote server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the four kinds of Proxy Servers in use today?

A

IP proxy, caching proxy, content filter, web security gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IP Proxy

A

Used to secure a network by keeping devices behind it anonymous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Caching Proxy

A

Attempts to serve client requests by delivering content from itself without actually contacting the remote server

17
Q

PAC files for security

A

Disable them!

18
Q

Internet Content Filter

A

Used in organizations to prevent users from accessing prohibited websites

19
Q

Web Security Gateway

A

A go-between device that scans for viruses, filters unwanted content like ads, and performs data loss prevention functions

20
Q

Honeypots and honeynets

A

Used to attract and trap potential attackers

21
Q

Honeypot

A

A single computer (or file, group of files, or IP range) that might be attractive to an attacker

22
Q

Honeynet

A

A group of computers, servers, or networks used to attract an attacker

23
Q

Data Loss Prevention

A

Systems designed to protect data by conducting content inspection of data being sent out of the network

24
Q

NIDS

A

Network Intrusion Detection System - attempts to detect, log, and alert on malicious network activities

25
Q

NIPS

A

Attempts to remove, detain, or redirect malicious traffic

26
Q

UTM

A

Unified Threat Management - Single device that combines several security devices within it