Test 1 Flashcards
Which type of firewall will protect against a SYN flood attack?
Static firewall
What type of firewall can protect from internal threats?
Host firewall
What are 2 advantages and disadvantages of hardware firewalls?
+ fast throughput
+ out-of-the-box
- expensive
- difficult to upgrade
What are 2 advantages and disadvantages of software firewalls?
+ cheap
+ less recovery time
- constant updates/patches
- stripped down OS without secure accounts
What is a Firewall?
Can be hardware or software which protects the network against intrusion and is the most effective way to secure the network link (put a firewall between the local network and internet).
What are some firewall best practices?
Principle of Least Privilege Apply traffic rules and exceptions: untrusted/trusted hosts/ports/applications Perform regular risk assessments Ensure proper change management Secure remote management Defer to company policy
What is Static Filtering?
A traditional firewall which has a very basic purpose: to control traffic entering in or exiting network interfaces.
Can be implemented on a single host and at/near a network gateway.
How are packets evaluated in Static Filtering?
Each is evaluated one at a time with the following header information:
Protocol, Source IP, Destination IP, Source port (rarely), Destination port
What is Stateful Filtering?
Packets belonging to active connections are allowed to pass through and connections are tracked in a state table.
How are packets evaluated in Static Filtering?
When new packets arrive, their contents are compared to the state tables to determine whether they are denied or permitted.
What is a Next Generation Firewall (NGFW)?
Same as traditional firewalls but can also filter based on applications, protocols and users and typically require more resources to do their job. They can be very expensive, depending on the hardware and licensing options that are chosen.
What is Unified Threat Management?
The concept of having a single gateway device (NGFW) with a multitude of security controls.
What are Web Application Firewalls (WAFs)?
Put in place to protect web applications, they inspect HTTP traffic going to and from web applications to detect and prevent attacks specific to web applications and can be considered a reverse proxy.
What is the Zero Trust Security Model?
The Zero Trust Security Model removes the assumption of trust, and inspects all possible traffic. It monitors traffic flowing from NorthSouth and EastWest and is analogous with the approach: never trust, always verify. It protects internal resources from lateral attacks.
What is TCP?
Transmission Control Protocol is connection oriented.
Connections begin with a three-way handshake.
Connections end with the session being terminated.