Perimeter Security Flashcards

1
Q

Perimeter Security

A

Security devices focused on the boundary between the LAN and the WAN in your organization’s network

Perimeter security relies on several different devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewalls: Packet Filtering

A

Inspects each packet passing through the firewall and accepts or rejects it based on the rules

Stateless Packet Filtering
Stateful packet filtering tracks the requests leaving the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewalls: NAT Filtering

A

Filters traffic based upon the ports being utilized and type of connection
(TCP or UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewalls: Application-Layer Gateway

A

Conducts an in-depth inspection based upon the application being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewalls: Circuit-Level Gateway

A

Operates at the session layer and only inspects the traffic during the establishment of the initial session over TCP or UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewalls: Explicit Allow

A

Traffic is allowed to enter or leave the network because there is an ACL rule that specifically allows it

Example: allow TCP 10.0.0.2 any port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewalls: Explicit Deny

A

Traffic is denied the ability to enter or leave the network because there is an ACL rule that specifically denies it

Example: deny TCP any any port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewalls: Implicit Deny

A

Traffic is denied the ability to enter or leave the network because there is no specific rule that allows it

Example: deny TCP any any port any
^ Usually at the end of an ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WAF

A

Web-Application Firewall:
Firewall installed to protect your server by inspecting traffic being sent to a web application

A WAF can prevent a XSS or SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Proxy Server

A

A device that acts as a middle man between a device and a remote server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IP Proxy

A

IP Proxy is used to secure a network by keeping its machines anonymous during web browsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Caching Proxy

A

Attempts to serve client requests by delivering content from itself without actually contacting the remote server

Disable Proxy Auto-Configuration (PAC) files for security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Web Security Gateway

A

A go-between device that scans for viruses, filters unwanted content, and performs data loss prevention functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeypot/Honeynet

A

Honeypots and honeynets are used to attract and trap potential attackers

Honeypot
A single computer (or file, group of files, or IP range) that might be attractive to an attacker

Honeynet
A group of computers, servers, or networks used to attract an attacker

Honeypots are normally used in security research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

UTM

A

Unified Threat Management:
Combination of network security devices and technologies to provide more defense in depth within a single device

UTM may include a firewall, NIDS/NIPS, content filter, anti-malware, DLP, and VPN

UTM is also known as a Next Generation Firewall (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly