07 - Firewalls and IDS Flashcards

1
Q

List four techniques used by firewalls to control access and enforce a security policy.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a DMZ network and what types of systems would you expect to find on such networks?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two main approaches to intrusion detection?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the difference between network traffic analysis, payload analysis, and endpoint behaviour analysis.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A common management requirement is that “all external Web traffic must flow via the organization’s Web proxy.” However, that requirement is easier stated than implemented.

  • Discuss the various problems and issues, possible solutions, and limitations supporting this requirement.
  • In particular, consider issues such as identifying exactly what constitutes “Web traffic” and how it may be monitored, given the large range of ports and various protocols used by Web browsers and servers.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the role of firewalls as part of a computer and network security strategy.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the key characteristics of firewalls.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Understand the relative merits of various choices for firewall location and configurations.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Understand the basic principles of and requirements for intrusion detection.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Discuss the key features of intrusion detection systems.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Present an overview of the key elements of malware defence.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly