Test 1 Flashcards

1
Q

Which type of firewall will protect against a SYN flood attack?

A

Static firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of firewall can protect from internal threats?

A

Host firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 2 advantages and disadvantages of hardware firewalls?

A

+ fast throughput
+ out-of-the-box
- expensive
- difficult to upgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 2 advantages and disadvantages of software firewalls?

A

+ cheap
+ less recovery time
- constant updates/patches
- stripped down OS without secure accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Firewall?

A

Can be hardware or software which protects the network against intrusion and is the most effective way to secure the network link (put a firewall between the local network and internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some firewall best practices?

A
Principle of Least Privilege
Apply traffic rules and exceptions: untrusted/trusted hosts/ports/applications
Perform regular risk assessments
Ensure proper change management
Secure remote management
Defer to company policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Static Filtering?

A

A traditional firewall which has a very basic purpose: to control traffic entering in or exiting network interfaces.
Can be implemented on a single host and at/near a network gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are packets evaluated in Static Filtering?

A

Each is evaluated one at a time with the following header information:
Protocol, Source IP, Destination IP, Source port (rarely), Destination port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Stateful Filtering?

A

Packets belonging to active connections are allowed to pass through and connections are tracked in a state table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are packets evaluated in Static Filtering?

A

When new packets arrive, their contents are compared to the state tables to determine whether they are denied or permitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Next Generation Firewall (NGFW)?

A

Same as traditional firewalls but can also filter based on applications, protocols and users and typically require more resources to do their job. They can be very expensive, depending on the hardware and licensing options that are chosen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Unified Threat Management?

A

The concept of having a single gateway device (NGFW) with a multitude of security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Web Application Firewalls (WAFs)?

A

Put in place to protect web applications, they inspect HTTP traffic going to and from web applications to detect and prevent attacks specific to web applications and can be considered a reverse proxy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Zero Trust Security Model?

A

The Zero Trust Security Model removes the assumption of trust, and inspects all possible traffic. It monitors traffic flowing from NorthSouth and EastWest and is analogous with the approach: never trust, always verify. It protects internal resources from lateral attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is TCP?

A

Transmission Control Protocol is connection oriented.
Connections begin with a three-way handshake.
Connections end with the session being terminated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What happens when you send a SYN to a closed port?

A

It will respond with a RST

17
Q

What happens when you send a SYN to a filtered port?

A

No response is received

18
Q

What happens when you send a SYN to an open port?

A

You will receive a SYN/ACK back

19
Q

What are some considerations when troubleshooting firewalls?

A

Can you replicate the problem?
Is the affected host online?
Is the affected service functioning?
Is it a routing problem?

20
Q

What is Netstat?

A

A command that can be used on both Windows and Linux to determine if a particular service is listening on a network interface.

21
Q

What is Nmap?

A

Network Mapper: a free open source tool that allows administrators (and attackers) to scan network devices to determine what ports are open and can be used to fingerprint services on open ports to determine specific service information such as web server type and version.

22
Q

What is Netfilter?

A

A packet filtering framework built into the Linux

kernel offering and uses kernel hooks at which packets can be inspected or manipulated.

23
Q

What is Iptables?

A

A standard firewall included in many Linux distributions which interfaces with the kernel-level netfilter hooks and is used to configure and view tables of packet filter rules. Nftables is a modern variant that may eventually become more popular than iptables.

24
Q

What are Iptables rules like?

A

Iptables rules are organized into chains. Chains are
collections of rules that a packet is checked against
sequentially.

25
Q

What is NAT?

A

Modifies network addresses in the IP headers of packets to allow remapping of one IP address space into another and allows hosts in a private network to transparently communicate with hosts on external networks.

26
Q

What is PAT?

A

Allows incoming sessions, that are initiated from an external host, to map a specific internal host and port.

27
Q

What are the default iptables chains?

A

INPUT – triggered after an incoming packet has been routed to the local system
OUTPUT – triggered by locally generated outbound traffic as it enters the network stack
FORWARD – triggered after an incoming packet has been routed and needs to be forwarded to another host

28
Q

What is the DHCP pattern?

A

Discover
Offer
Request
Acknowledge

29
Q

What is Packet Filter?

A

OpenBSD’s system for filtering TCP/IP traffic and doing NAT. It is also capable of normalizing and conditioning TCP/IP traffic and providing bandwidth control and packet prioritization.