Lesson 10 Implementing Network Security Appliances Flashcards

1
Q

What is Packet filtering

A

A Layer 3 firewall technology that compares packet headers against ACLs to determine which network traffic to accept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Ingress traffic filtering

A

the concept of firewalling traffic entering a network from an external source such as the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a stateless firewall?

A

A type of firewall that does not preserve information about the connection between two hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a stateful inspection?

A

A technique used in firewalls to analyze packets down to the application layer rather than filtering packets only by header information, enabling the firewall to enforce tighter and more security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a state table?

A

Information about sessions between hosts that is gathered by a stateful firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an appliance firewall?

A

A standalone hardware device that performs only the function of a firewall, which is embedded into the appliance’s firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a layer 3 firewall do

A

performs forwarding between subnets. Each interface on the firewall connects to a different subnet and represents a different security zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the Layer 2 firewall do

A

inspects traffic passing between two nodes, inspect and filter traffic on the basis of the full range of packet headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a router firewall

A

A hardware device that has the primary function of a router, but also has firewall functionality embedded into the router firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Host-based firewall / personal firewall

A

implemented as a software application running on a single host designed to protect that host only. As well as enforcing packet filtering ACLs, a personal firewall can be used to allow or deny software processes from accessing the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application Firewall

A

Software designed to run on a server to protect a particular application such as a web server or SQL server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Operating system firewall (NOS)

A

A software-based firewall running on a network server OS, such as Windows or Linux, so that the server can function as a gateway or proxy for a network segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a proxy server

A

A server that mediates the communications between a client and another server. It can filter and often modify communications, as well as provide caching services to improve performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a forward proxy

A

provides for protocol-specific outbound traffic. For example, you might deploy a web proxy that enables client computers on the LAN to connect to websites and secure websites on the Internet. This is a forward proxy that services TCP ports 80 and 443 for outbound traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

caching engines

A

A feature of many proxy servers that enables the servers to retain a copy of frequently requested web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a multipurpose proxy

A

A proxy configured with filters for multiple protocol types such as HTTP,FTP, and SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a transparent proxy

A

A server that redirects requests and responses for clients configured with the proxy address and port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What port does a non-transparent proxy listen on

A

port 8080

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

transparent (or forced or intercepting) proxy

A

A server that redirects requests and responses without the client being explicitly configured to use it. Also referred to as a forced or intercepting proxy.

20
Q

What is a reverse proxy

A

A type of proxy server that protects servers from direct contact with client requests.

21
Q

What are some filter ruleset principles for a packet filtering firewall

A
  1. Block incoming requests from internal or private Ip addresses that have been spoofed
  2. Block incoming requests from protocols that should only be functioning at a local network level, such as ICMP, DHCP, or routing protocol traffic
  3. Use penetration testing to confirm the configuration is secure. Log access attempts and monitor the logs for suspicious activity
  4. Take the usual steps to secure the hardware on which the firewall is running and use of the management interface
22
Q

What is an Intrusion detection system (IDS)

A

a means of using software tools to provide real-time analysis of either network traffic or system and application logs.

23
Q

What is a Network Based IDS (NIDS)

A

captures traffic via a packet sniffer, referred to as a sensor. It analyzes the packets to identify malicious traffic and displays alerts to a console or dashboard.

24
Q

What is a NDIS used to identify

A

used to identify and log hosts and applications and to detect attack signatures, password guessing attempts, port scans, worms, backdoor applications, malformed packets or sessions, and policy violations

25
Q

What is a snort

A

An open source NIDS, allows the detection engine to identify the very latest threats.

26
Q

What is a Test access point(tap)

A

A hardware device inserted into a cable to copy frames for analysis.

27
Q

What is an Active tap?

A

performs signal regeneration

28
Q

What is an Intrusion Prevention System (IPS)

A

can provide an active response to any network threats that it matches

29
Q

What is a Behavioral-based detection system

A

A network monitoring system that detects changes in normal operating data sequences and identifies abnormal sequences

30
Q

What is heuristics?

A

A method that uses feature comparisons and likenesses rather than specific signature matching to identify whether the target of observation is malicious

31
Q

User and entity behavior analytics (UEBA)

A

scan indicators from multiple intrusion detection and log sources to identify anomalies. They are often integrated with security information and event management (SIEM) platforms.

32
Q

Network traffic analysis (NTA)

A

apply analysis techniques only to network streams, rather than multiple network and log data sources

33
Q

Next Generation Firewall (NGFW)

A

Host or network firewall capable of parsing application layer protocol headers and data (such as HTTP or SMTP) so that sophisticated, content-sensitive ACLs can be developed

34
Q

Unified threat management (UTM)

A

All-in-one security appliances and agents that combine the functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, data loss prevention, content filtering, and so on.

35
Q

Secure Web gateway (SWG)

A

An appliance or proxy server that mediates client connections with the Internet by filtering spam and malware and enforcing access restrictions on types of sites visited, time spent, and bandwidth consumed.

36
Q

Host-based IDS (HIDS)

A

A type of IDS that monitors a computer system for unexpected behavior or drastic changes to the system’s state.

37
Q

File integrity monitoring (FIM)

A

A type of software that reviews system files to ensure that they have not been tampered with.

38
Q

Web application firewall (WAF)

A

A firewall designed specifically to protect software running on web servers and their back-end databases from code injection and DoS attacks.

39
Q

Network Monitor

A

Auditing software that collects status and configuration information from network devices. Many products are based on the Simple Network Management Protocol (SNMP).

40
Q

security information and event management (SIEM)

A

A solution that provides real-time or near-real-time analysis of security alerts generated by network hardware and applications

41
Q

What is the first task of the SIEM

A

to collect data inputs from multiple sources

42
Q

What are the three types of log collection

A

Agent-based
Listener/collector
Syslog
Sensor

43
Q

Agent based log collection

A

As events occur on the host, logging data is filtered, aggregated, and normalized at the host, then sent to the SIEM server for analysis and storage.

44
Q

listener/collector log collection

A

push updates to the SIEM server using a protocol such as syslog or SNMP. A process runs on the management server to parse and normalize each log/monitoring source.

45
Q

Syslog log collection

A

allows for centralized collection of events from multiple sources. It also provides an open format for event logging messages, and as such has become a de facto standard for logging of events from distributed systems. For example, syslog messages can be generated by Cisco routers and switches, as well as servers and workstations

46
Q

Sensor log collection

A

collect packet captures and traffic flow data from sniffers.

47
Q

Log aggregation

A

refers to normalizing data from different sources so that it is consistent and searchable.