Chapter 15 Flashcards

1
Q

is used to create a security zone that allows public traffic but the traffic is isolated from the company private network. p528

A

demilitarized zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this type of firewall is that it’s designed to protect an entire network of computers instead of just one system, and it’s usually a combination of hardware and software. p530

A

network-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This type of firewall is usually a software implementation, because you don’t need any additional hardware in your personal computer to run it. p530

A

host-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The first line of defense for any network that’s connected to the Internet is what we call? p531

A

access control lists (ACLs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

an ACL applied to a protocol is referred to as a what? p532

A

distribution list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the two types of ACLs.p532-33

A

Standard ACLs

Extended ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a standard ACLs p532

A

These use only the source IP address in an IP packet as the condition test, so all decisions regarding a packet will be based on the source IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a extended ACLs p533

A

Extended ACLs go the distance and evaluate lots of the other fields in the Layer 3 and 4 headers of an IP packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does the Inbound ACLs do. p533

A

When an ACL is applied to inbound packets on an interface, those packets are processed through the ACL before being routed to the outbound interface. Any packets that are denied won’t be routed because they’ll be discarded before the routing process is completed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does the Outbound ACLs do. p533

A

When an ACL is applied to outbound packets on an interface, those packets are routed to the outbound interface and then processed through the ACL before being queued.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

protects data on the inside of a firewall; and because TCP/IP is what the Internet runs on, most external attacks take direct aim at this protocol stack. p534

A

Protocol switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firewalls use dynamic packet filtering to ensure that the packets they forward match sessions initiated on their private side by something called a _______ or _______ which keeps track of all communication sessions between stations from inside and outside the firewall. p537

A

dynamic state list

state table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a proxy services. p538

A

an internal client sends a request to an external host on the Internet. That request will get to the proxy server first, where it will be examined, broken down, and handled by an application that will create a new packet requesting information from the external server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are some the proxy server types. p539-40

A

IP proxy
Web (HTTP) proxy
FTP proxy
SMTP proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what does an IP proxy do. p539

A

An IP proxy hides the IP addresses of all the devices on the internal network by exchanging its IP address for the address of any requesting station.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what does an web HTTP proxy do. p539

A

Web proxies, also called HTTP proxies, handle HTTP requests on behalf of the sending workstation. When these are implemented correctly, a client’s web browser asks a web server on the Internet for a web page using an HTTP request.

17
Q

what does an FTP proxy do. p540

A

FTP proxies handle the uploading and downloading of files from a server on behalf of a workstation.

18
Q

what does an SMTP proxy do. p540

A

Any packets or messages that contain material that is not considered secure can be blocked. Many SMTP proxies allow network virus protection software to scan inbound mail.

19
Q

means that they scan different types of incoming traffic in an effort to detect problems. p 542

A

scanning services

20
Q

Skips scanning of files larger than 50MB; can also enable deferred scanning p543

A

Web HTTP and FTP

21
Q

Cleans emails or attachments containing malware, and attaches a notification that the malware was deleted p543

A

Mail SMTP

22
Q

Scans all scannable files in the email

Rejects all messages larger than 15MB p543

A

Mail SMTP and POP3

23
Q

what is content filtering p544

A

Content filtering is very closely related to scanning services, and on Cisco routers it’s also provided by the CSC SSM. Specifically, content filtering means blocking data based on the content of the data rather than the source of the data. Most commonly, this is used to filter email and website access.

24
Q

what is an signature identification p544

A

is uses that are known will have a signature, which is a particular pattern of data, within them. Firewalls (and antivirus programs) can use signatures to identify a virus and remove it.

25
Q

what is Zones p545

A

zone is an individual area of the network that has been configured with a specific trust level. Firewalls are ideal devices to regulate the flow of traffic between zones.

26
Q

An intrusion detection system does replace a firewall on your network. T/F p548

A

false/ does not

27
Q

An intrusion detection system can detect attacks within encrypted traffic. T/F p548

A

False/ it can’t detect attacks

28
Q

There are two ways IDSs can detect attacks or intrusions. p548

A

MD-IDS/ it works by looking for fingerprints.

AD-IDS/ basically watches for anything out of the ordinary

29
Q

When an IDS moves to prevent an attack it’s often called a reactive system or an __________. p549

A

Intrusion protection system (IPS)

30
Q

What are the three common active responses. p549

A

Changing Network Configuration
Terminating Sessions
Deceiving the Attacker

31
Q

What is a Host-Based IDS (HIDS) p 551

A

software runs on one computer to detect abnormalities on that system alone by monitoring applications, system logs and event logs not by directly monitoring network traffic.

32
Q

What is an Nessus p551

A

Is a propriety vulnerability scanning program that requires a license to use commercially yet is the single most popular scanning program in use.

33
Q

What is an VPN Concentrators p552

A

Is a device that create remote access for virtual private networks VPNs either for users logging in remotely or for a large site-to-site VPN.

34
Q

What are Critical Nodes p562

A

Are individual systems or groups of systems without which the organization cannot operate.The process of identifying these system should begin with prioritization of the business processes that each supports.