Chapter 15 - Supplement - Sheet1 Flashcards

1
Q

Public Network

A

Network that everyone has access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Private network

A

network that only select people (perhaps on an ACL) have access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network-Based Firewall

A

what companies use to protect their private network from
public networks. The defining characteristic of this type of firewall is that it’s designed
to protect an entire network of computers instead of just one system. Usually a combination of hardware and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Host-based Firewall

A

implemented on a single
machine so it protects only that one machine. This type of firewall is usually a software
implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACL

A

Access Control Lists. These reside on your routers and determine by IP addresses which machines are allowed to use those routers and in what direction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of attacks to ACLs mitigate against

A

IP address spoofing inbound, IP address spoofing outbound, DoS TCP SYN attacks, DoS Smurf attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do ACLs mitigate against threats

A

Using TCP intercept to address DoS TCP SYN attacks, Filtering ICMP messages, inbound, Filtering ICMP messages, outbound, Filtering Traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Standard ACLs

A

Use only the source IP address to determine allow/deny. Allowing a single IP address allows it to transmit any protocol, any port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Extended ACLs

A

Make allow/deny decisions based on more than the source IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Standard rules for ACLs

A

Deny any addresses from your internal networks to enter your internal network; Deny any local host addresses (127.0.0.0/8).; Deny any reserved private addresses.; Deny any addresses in the IP multicast address range (224.0.0.0/4).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port security

A

Managing switch security (layer 2) to manage risk on internal networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 examples of port security

A

Using MAC address filtering to ensure that only a specific address can use a specific port. Using MAC address filtering to ensure that only a group of MAC addresses can access a sensitive area of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Packet Filtering

A

the ability of a router or a firewall to discard packets that don’t
meet the right criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

dynamic packet filtering

A

Firewalls use dynamic packet filtering to ensure that the packets
they forward match sessions initiated on their private side by something called a dynamic
state list or state table, which keeps track of all communication sessions between stations
from inside and outside the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of proxies

A

IP proxy, Web (HTTP) proxy, FTP Proxy, SMTP Proxy,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

2 types of network layer firewalls

A

Statefull and Stateless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Stateless Packet Filter

A

a basic packet filter doesn’t care about whether the packet it
is examining is stand-alone or part of a bigger message stream. That type of packet filter
is said to be stateless. susceptible to various DoS attacks and IP spoofing

18
Q

Advantage of stateless over statful firewall

A

Uses less memory

19
Q

Stateful packet filtering

A

stateful firewall is one that keeps track of the various
data streams passing through it. If a packet that is a part of an established connection hits
the firewall, it’s passed through. New packets are subjected to the rules as specified in the
ACL

20
Q

Firewall Scanning Services

A

Most firewalls are capable of performing scanning services, which means that they scan different
types of incoming traffic in an effort to detect problems. For example, firewalls can
scan incoming HTTP traffic to look for viruses or spyware, or they can scan email looking
for spam

21
Q

IDS

A

Intrusion Detection System. keeps track of all activity on your network so you can see if
someone has been trespassing

22
Q

2 ways IDS systems can detect attacks or intrusions

A

misuse-detection IDS (MD-IDS), anomaly-detection IDS (AD-IDS).

23
Q

MD-IDS

A

The IDS sends up an alarm only if it recognizes

the fingerprints typical of attackers

24
Q

AD-IDS

A

An AD-IDS basically watches for
anything out of the ordinary; if it discovers fingerprints where there shouldn’t be any, it will
send out an alert

25
Q

2 common IDS implementations

A

Network-Based IDS (Most Common), Host-Based IDS

26
Q

Well-known vulnerability scanners

A

NESSUS, NMAP (Network mapper)

27
Q

Where can a DMZ be placed

A

A demilitarized zone (DMZ) can be located outside
a firewall, connected directly to the Internet. However, it can also be placed after the
firewall.

28
Q

Which two levels of the OSI model can firewalls operate on?

A

Application, Network

29
Q

Which level of the OSI model does port security on switches operate on?

A

Data Link

30
Q

IPS

A

An intrusion prevention system (IPS) is like an IDS, but with two key differences.
First, it learns what is “normal” on the network and can react to abnormalities even if
they’re not part of the signature database. Second, it can issue an active response such as
shutting down a port, resetting connections, or attempting to lull the attacker into a trap.

31
Q

Which type of security device employs a redirection device known as a honeypot?

A

IPS

32
Q

Which type of firewall keeps track of existing connections passing through it?

A

Stateful

33
Q

If you wanted to ensure that your firewall could block inflammatory email, which type
of service would you look for?

A

Content Filtering

34
Q

A firewall’s list of rules that it uses to block traffic is called ___________________.

A

Access control list

35
Q

If you wanted to allow remote access to 500 users, which type of device is recommended?

A

A VPN concentrator

36
Q

If data from one of your subnets should be restricted from entering another subnet, the
subnets should be configured as different ___________________.

A

Security zones

37
Q

What type of internal security is implemented at Layer 2?

A

port security

38
Q

How does an ACL treat any traffic type by default?

A

Deny

39
Q

What is a group of servers used to lure attackers called?

A

Honeypot

40
Q

Logging, notification, and shunning are what types of reactions from what type of
security device?

A

Passive reactions from an IDS