Security Infrastructure Flashcards
- Given a scenario, you must be able to apply security principles to secure enterprise architecture - Given a scenario, you must be able to modify enterprise capabilities to enhance security
Which of the following port ranges is used for temporary outbound connections?
A) 0-1023
B) 1024-49151
C) 49152-65535
D) 65536-70000
Answer: C) 49152-65535
Explanation:
A) 0-1023: Incorrect. This range is for Well-Known Ports assigned by IANA for common protocols (e.g., HTTP, FTP).
B) 1024-49151: Incorrect. This range is for Registered Ports, which are vendor-specific and registered with IANA.
C) 49152-65535: Correct. This range is for Dynamic/Private Ports, used for temporary outbound connections.
D) 65536-70000: Incorrect. This range is invalid, as the maximum number of ports is 65,535.
Which protocol is connectionless and does not guarantee data delivery?
A) TCP
B) UDP
C) Both TCP and UDP
D) Neither TCP nor UDP
Answer: B) UDP
Explanation:
A) TCP: Incorrect. TCP is connection-oriented and guarantees data delivery through error checking and retries.
B) UDP: Correct. UDP is connectionless and does not guarantee delivery, making it faster but less reliable.
C) Both TCP and UDP: Incorrect. Only UDP is connectionless.
D) Neither TCP nor UDP: Incorrect. UDP fits the description.
In an SSH connection, which port is used on the server to listen for incoming connections?
A) Outbound port on the client
B) Inbound port 22 on the server
C) Dynamic port on the server
D) Registered port on the client
Answer: B) Inbound port 22 on the server
Explanation:
A) Outbound port on the client: Incorrect. The outbound port is used by the client to initiate the connection, not to listen.
B) Inbound port 22 on the server: Correct. The server listens for SSH connections on inbound port 22.
C) Dynamic port on the server: Incorrect. Dynamic ports are used for temporary outbound connections, not for listening.
D) Registered port on the client: Incorrect. Registered ports are vendor-specific and not directly related to SSH connections.
Which protocol uses port 443 for secure web communication?
A) HTTP
B) FTP
C) HTTPS
D) SSH
Answer: C) HTTPS
Explanation:
A) HTTP: Incorrect. HTTP uses port 80 for unsecured web communication.
B) FTP: Incorrect. FTP uses port 21 for file transfers.
C) HTTPS: Correct. HTTPS uses port 443 for secure web communication.
D) SSH: Incorrect. SSH uses port 22 for secure remote access.
What is the primary purpose of the TCP 3-way handshake?
A) To establish a secure connection
B) To ensure reliable and ordered data delivery
C) To encrypt data during transmission
D) To terminate a connection
Answer: B) To ensure reliable and ordered data delivery
Explanation:
A) To establish a secure connection: Incorrect. The 3-way handshake establishes a connection but does not inherently provide encryption (security is handled by protocols like TLS).
B) To ensure reliable and ordered data delivery: Correct. The 3-way handshake ensures that data is delivered reliably and in the correct order.
C) To encrypt data during transmission: Incorrect. Encryption is not part of the 3-way handshake.
D) To terminate a connection: Incorrect. The 3-way handshake is used to establish, not terminate, a connection.
Which of the following port ranges is assigned by IANA for commonly-used protocols?
A) 0-1023
B) 1024-49151
C) 49152-65535
D) 65536-70000
Answer: A) 0-1023
Explanation:
A) 0-1023: Correct. This range is for Well-Known Ports assigned by IANA for common protocols (e.g., HTTP, FTP).
B) 1024-49151: Incorrect. This range is for Registered Ports, which are vendor-specific.
C) 49152-65535: Incorrect. This range is for Dynamic/Private Ports used for temporary connections.
D) 65536-70000: Incorrect. This range is invalid, as the maximum number of ports is 65,535.
You are designing a secure network architecture for an enterprise. Where should a Unified Threat Management (UTM) firewall be placed to ensure maximum security?
A) Between the LAN and the internet connection
B) Inside the LAN, close to the application server
C) On the endpoint devices
D) In the DMZ
Answer: A) Between the LAN and the internet connection
Explanation:
A) Correct: A UTM firewall should be placed between the LAN and the internet connection to act as the first line of defense against external threats.
B) Incorrect: This placement is more suitable for an Application-Level Proxy Firewall, which is positioned close to the application server.
C) Incorrect: Endpoint devices use host-based firewalls, not UTM firewalls.
D) Incorrect: The DMZ is used for publicly accessible servers, not for UTM placement.
An organization wants to implement a firewall that can distinguish between different types of traffic and conduct deep packet inspection. Which type of firewall should they choose?
A) Packet Filtering Firewall
B) Stateful Firewall
C) Next-Generation Firewall (NGFW)
D) Circuit-Level Proxy Firewall
Answer: C) Next-Generation Firewall (NGFW)
Explanation:
A) Incorrect: Packet Filtering Firewalls only inspect packet headers and cannot distinguish between traffic types.
B) Incorrect: Stateful Firewalls track connections but lack deep packet inspection capabilities.
C) Correct: NGFWs are application-aware and can conduct deep packet inspection.
D) Incorrect: Circuit-Level Proxy Firewalls operate at the session layer and do not perform deep packet inspection.
An attacker is sending fragmented packets to evade detection by a security system. Which type of attack is this?
A) IP Spoofing
B) SYN Flood Attack
C) Packet Fragmentation Attack
D) Cross-Site Scripting (XSS)
Answer: C) Packet Fragmentation Attack
Explanation:
A) Incorrect: IP Spoofing involves faking the source IP address, not fragmenting packets.
B) Incorrect: SYN Flood Attacks overwhelm a server with incomplete TCP handshakes.
C) Correct: Packet Fragmentation Attacks involve breaking packets into smaller fragments to evade detection.
D) Incorrect: XSS is a web application attack, not a firewall attack.
You are securing a web application and want to actively block attacks in real-time. Which WAF placement should you use?
A) Out-of-Band
B) In-line
C) Mirrored Port
D) SPAN Port
Answer: B) In-line
Explanation:
A) Incorrect: Out-of-Band WAFs monitor traffic but do not actively block attacks.
B) Correct: In-line WAFs sit in the traffic path and actively block malicious requests.
C) Incorrect: Mirrored Ports are used for monitoring, not active blocking.
D) Incorrect: SPAN Ports are similar to Mirrored Ports and are used for traffic analysis, not active blocking.
An organization wants to enhance its security by implementing a firewall that provides full-stack visibility and integrates with other security products. Which firewall should they choose?
A) Packet Filtering Firewall
B) Stateful Firewall
C) Next-Generation Firewall (NGFW)
D) Kernel Proxy Firewall
Answer: C) Next-Generation Firewall (NGFW)
Explanation:
A) Incorrect: Packet Filtering Firewalls lack full-stack visibility and integration capabilities.
B) Incorrect: Stateful Firewalls do not provide full-stack visibility.
C) Correct: NGFWs offer full-stack visibility and can integrate with other security products.
D) Incorrect: Kernel Proxy Firewalls inspect packets at every layer but do not provide full-stack visibility or integration.
what does integrating with other security products mean?
For example, a Next-Generation Firewall (NGFW) can communicate with an IPS system to block suspicious traffic or send security logs to a SIEM system for deeper analysis. This coordination reduces manual work and improves security efficiency.
An organization wants to prevent common web application attacks like cross-site scripting (XSS) and SQL injections. Which security solution should they implement?
A) Packet Filtering Firewall
B) Web Application Firewall (WAF)
C) Stateful Firewall
D) Circuit-Level Proxy Firewall
Answer: B) Web Application Firewall (WAF)
Explanation:
A) Incorrect: Packet Filtering Firewalls cannot inspect HTTP traffic for web application attacks.
B) Correct: WAFs are designed to inspect HTTP traffic and prevent web application attacks like XSS and SQL injections.
C) Incorrect: Stateful Firewalls track connections but cannot inspect application-layer traffic.
D) Incorrect: Circuit-Level Proxy Firewalls operate at the session layer and do not inspect application-layer traffic.
An organization is using a UTM firewall but wants to improve efficiency by using a single engine for all security functions. Which firewall should they migrate to?
A) Packet Filtering Firewall
B) Stateful Firewall
C) Next-Generation Firewall (NGFW)
D) Application-Level Proxy Firewall
Answer: C) Next-Generation Firewall (NGFW)
Explanation:
A) Incorrect: Packet Filtering Firewalls do not use a single engine for multiple functions.
B) Incorrect: Stateful Firewalls lack the advanced capabilities of NGFWs.
C) Correct: NGFWs use a single engine for all security functions, improving efficiency.
D) Incorrect: Application-Level Proxy Firewalls are limited to Layer 7 inspection and do not integrate multiple functions.
An organization wants to ensure that its firewall can track connections and allow return traffic for outbound requests. Which type of firewall should they configure?
A) Packet Filtering Firewall
B) Stateful Firewall
C) Circuit-Level Proxy Firewall
D) Kernel Proxy Firewall
Answer: B) Stateful Firewall
Explanation:
A) Incorrect: Packet Filtering Firewalls do not track connections.
B) Correct: Stateful Firewalls track connections and allow return traffic for outbound requests.
C) Incorrect: Circuit-Level Proxy Firewalls operate at the session layer but do not track connections like Stateful Firewalls.
D) Incorrect: Kernel Proxy Firewalls inspect packets at every layer but do not specifically track connections.
Stateful Firewall is designed to keep track of the state of active connections (e.g., TCP connections) and uses this information to determine whether incoming traffic is part of an existing, legitimate connection.
For example, when a user sends an outbound request, the firewall keeps track of that request, allowing the return traffic (response) to come back through the firewall. This is important because return traffic needs to be associated with the original request.
Which security architecture uses a dual-homed host to separate internal and external networks?
A) Packet Filtering Firewall
B) Screened Subnet
C) Stateful Firewall
D) Web Application Firewall
Answer: B) Screened Subnet
Note: How does packet inspection work at each layer?
Layer 2 (Data Link Layer) → Think of this as the “physical address” level. If a firewall operates here, it can filter traffic based on MAC addresses (like identifying devices in a local network) and control which devices can talk to each other.
Layer 3 (Network Layer) → This is where IP addresses come into play. A firewall at this layer checks source and destination IPs to decide whether to allow or block traffic. (Example: “Only let traffic from 192.168.1.1 through.”)
Layer 4 (Transport Layer) → This layer deals with ports and protocols (like TCP and UDP). A firewall here can filter traffic based on port numbers (e.g., blocking port 22 for SSH) and connection types (TCP vs. UDP). It might also detect packet types (like SYN packets used in TCP handshakes) to block suspicious activity.
Layer 5 (Session Layer) → This is about managing sessions between two systems. A firewall at this layer can verify if a session is properly established before allowing communication. (Example: A Circuit-Level Proxy Firewall ensures a valid handshake happens before forwarding data.)
Which port configuration is used to monitor network traffic without disrupting the data path?
A) In-line Port
B) Mirrored Port
C) SPAN Port
D) Both B and C
Answer: D) Both B and C
Which firewall operates at the application layer (Layer 7) and inspects traffic based on content?
A) Layer 4 Firewall
B) Layer 7 Firewall
C) Circuit-Level Proxy Firewall
D) Kernel Proxy Firewall
Answer: B) Layer 7 Firewall
Which type of firewall is specifically designed to prevent cross-site scripting (XSS) attacks?
A) Packet Filtering Firewall
B) Web Application Firewall (WAF)
C) Stateful Firewall
D) Circuit-Level Proxy Firewall
Answer: B) Web Application Firewall (WAF)
Which firewall feature provides visibility into all layers of network traffic, from Layer 1 to Layer 7?
A) Deep Packet Inspection
B) Full-Stack Visibility
C) Application Awareness
D) Signature-Based Intrusion Protection
Answer: B) Full-Stack Visibility
You are configuring an Access Control List (ACL) on a firewall. Which of the following best practices should you follow to ensure proper traffic filtering?
A) Place generic rules at the top and specific rules at the bottom.
B) Place specific rules at the top and generic rules at the bottom.
C) Use only permit rules and avoid deny rules.
D) Use only deny rules and avoid permit rules.
Answer: B) Place specific rules at the top and generic rules at the bottom.
Explanation:
A) Incorrect: Generic rules at the top can lead to unintended traffic matches, bypassing specific rules.
B) Correct: Specific rules at the top ensure precise filtering, while generic rules at the bottom act as a catch-all.
C) Incorrect: Using only permit rules would allow all unmatched traffic, reducing security.
D) Incorrect: Using only deny rules would block all traffic, including legitimate traffic.
What happens to traffic that does not match any rule in an ACL?
A) It is automatically permitted.
B) It is automatically denied.
C) It is logged and then permitted.
D) It is forwarded to another ACL for evaluation.
Answer: B) It is automatically denied.
Explanation:
A) Incorrect: Unmatched traffic is not permitted; this would create a security risk.
B) Correct: The implied deny rule ensures that unmatched traffic is automatically denied.
C) Incorrect: While logging is a good practice, unmatched traffic is still denied.
D) Incorrect: Traffic is not forwarded to another ACL; it is denied if no rule matches.
An organization wants to block a large group of IP addresses associated with a known malicious network. Which firewall feature should they use?
A) Implied Deny
B) Bulk Blocking
C) Stateful Inspection
D) Deep Packet Inspection
Answer: B) Bulk Blocking
Explanation:
A) Incorrect: Implied deny blocks unmatched traffic but does not address bulk blocking.
B) Correct: Bulk blocking allows the organization to block a large group of IP addresses or domains at once.
C) Incorrect: Stateful inspection tracks connections but does not block multiple IPs simultaneously.
D) Incorrect: Deep packet inspection analyzes traffic content but does not block multiple IPs.
An organization wants to protect its entire network with a dedicated security device. Which type of firewall should they implement?
A) Software-Based Firewall
B) Hardware-Based Firewall
C) Web Application Firewall (WAF)
D) Kernel Proxy Firewall
Answer: B) Hardware-Based Firewall
Explanation:
A) Incorrect: Software-based firewalls protect individual devices, not the entire network.
B) Correct: Hardware-based firewalls are dedicated devices that protect an entire network or subnet.
C) Incorrect: WAFs focus on web application traffic, not general network traffic.
D) Incorrect: Kernel proxy firewalls inspect packets at every layer but are not dedicated network devices. Note: it doesn’t inpect pakcet at eavery layer.