Security Tehcnologies Flashcards

1
Q

Firewall

A

Uses a set of rules defining the types of traffic permitted or denied through the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Packet-Filtering Firewall

A
  • Permits or denies traffic based on packet header
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stateful Firewall

A

Inspects traffic as part of a session and recognizes where the traffic originated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NextGen Firewall (NGFW)

A
  • Third-generation firewall that conducts deep packet inspection and packet filtering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access Control List(ACL)

A

Set of rules applied to router interfaces that permit or deny certain traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewall Zone

A
  • Firewall interface in which you can set up rules
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Inside

A
  • Connects to corporate LAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Outside

A

Connects to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Demilitarized Zone (DMZ)

A
  • Connects to devices that should have restricted access from the outside zone (like web servers)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unified Threat Management (UTM) Device

A

Combines firewall, router, intrusion detection/preventions system, anti-malware, and other features into a single device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Signature-Based Detection

A

Signature contains strings of bytes (a pattern) that triggers detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Policy-Based Detections

A

Relies on specific declaration of the security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Statistical Anomaly-Based Detection

A

Watches traffic patterns to build baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Non-Statistical Anomaly-Based Detections

A

Administrator defines the patterns/baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network-based (NIDS/NIPS)

A
  • A network device protects entire network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Host-based (HIDS/HIPS)

A

Software-based and installed on servers and clients