Section 12 Perimeter Security Flashcards

1
Q

Security devices focused on the boundary between the LAN and the WAN in your organization’s network.

A

Perimeter Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Software Based
  2. Hardware Based
  3. Embedded
A

Types of Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Inspects each packet passing through the firewall and accepts or rejects it based on the rules.

A

Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Stateless
  2. Stateful
A

Types of Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Filters traffic based upon the ports being utilized and type of connection (TCP or UDP).

A

NAT Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Conducts an in depth inspection based upon the application being used.

A

Application Layer Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Operates at the session layer and only inspects the traffic during the establishment of the initial session over TCP or UDP.

A

Circuit Level Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Traffic is allowed to enter or leave the network because there is an ACL rule that specifically allows it.

A

Explicit Allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Traffic is denied the ability to enter or leave the network because there is an ACL rule that specifically denies it.

A

Explicit Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Traffic is denied the ability to enter or leave the network because there is no specific rule that allows it.

A

Implicit Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Firewall installed to protect your server by inspecting traffic being sent to a web application.

A

Web Application Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. IP Proxy
  2. Caching Proxy
  3. Content File
  4. Web Security Gateway
A

Types of Proxy’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Used to secure a network by keeping its machines anonymous during web browsing.

A

IP Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attempts to serve client requests by delivering content from itself without actually contacting the remote server.

A

Caching Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Used in organizations to prevent users from accessing prohibited websites and other content.

A

Internet Content Filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A go between device that scans for viruses, filters unwanted content, and performs data loss prevention functions.

A

Web Security Gateway

17
Q

A single computer (or file, group of files, or IP range) that might be attractive to an attacker.

A

Honeypot

18
Q

Attempts to detect, log, and alert on malicious network activities.

A

Network Intrusion Detection System (NIDS)

19
Q

Attempts to remove, detain, or redirect malicious traffic.

A

Network Intrusion Prevention System (NIPS)

20
Q

Combination of network security devices and technologies to provide more defense in depth within a single device.

A

Unified Threat Management