Firewall [midtem] Flashcards

(37 cards)

1
Q

controls traffic entering/exiting network interfaces
scans only 1 packet at a time
scans (protocol,src/dest IP address & TCP/UDP port)
low security - no scans above Layer 3 OSI (network)
high performance and scalebility
router at internet edge to filter out noise for firewalls

A

STATIC PACKET FILTERING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

series of packets in/out of network
tracks state & characteristics of network connections connections tracked via state table
extra security (NAT & VPN)
new packets are compared to the state table
better security (scans Layer 3 and UP)
high performance, transparency & extensibility
state table can automatically adjust firewall
dynamic

A

STATEFUL PACKET INSPECTION (SPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

network gateway between networks or security zones
does the same as SPI & SPF firewalls + more!
operates on Layer 7 with application awareness
filter based off apps, protocols and users (LDAP & AD)
very expensive $$$$
resource heavy (depending on security ft enabled)
single gateway device + security controls = Unified Threat Management (UTM)

A

Next Generation Firewall (NGFW) (third-gen)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

firewall feature that is based on patterns or signatures…

A

Intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

can reset or block connections based on patterns and signatures that perform malicious activities

A

Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

inspects files travelling over the firewall for virus signatures, can detect and block malware BEFORE downloaded

A

Inline Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

detects and blocks specific data structures from being exported

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

block based on predetermined web site categorization (porn)

A

Web Proxy | Web Content Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

gateway placed before SMTP server for extra filtering

A

Email Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • protects web applications
    • inspects HTTP traffic going to and from web apps
    • prevents attacks i.e: buffer overflows, cross site scripting (XSS) *token hi-jacking and SQL injection (SQLi) *injection attacks should not exist if setup correctly!
    • sometimes a reverse proxy
    • a proxy will sit between webserver and internet
A

Web Application Firewall (WAF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • scans traffic flowing North South
    • does not protect network from attacks originating from within network!
    • analogous with trust but verify
A

Perimeter-Centric Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • removes assumption of trust and inspects all possible traffic
    • made up of user and application identification
    • content scanning to move trust boundary as close to resource as possible
    • scans traffic in all directions North, South, East & West
    • never trust!, always verify!
    • protects internal network from lateral attacks
A

Zero Trust Security Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

connection-oriented
Connections start with 3-way handshake
connections end with session being terminated

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • client sends server SYN packet to synchronize sequence numbers
    • server responds with synchronization acknowledge, or SYN/ACK
    • client sends acknowledge (ACK), and TCP connection is established
    • data is now interchangeable between server & client
    • SYN/ACK flags are contained IN the TCP header
A

TCP 3-Way Handshake

SYN—->
ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

client sends FIN-ACK packet
server responds FIN-ACK
client responds final ACK packet

A

TCP Connection Termination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • are large port numbers(#) for clients source port(s)
    • chosen at random!
    • 49152-65535 recommended port range via IANA
A

Ephemeral Source Port

17
Q
LISTEN (linux) 
LISTENING (windows) 
------------------------------------
ESTABLISHED 
--------------------------------------
TIME-WAIT
A

TCP Connection States

18
Q

Domain
Private
Public

A

Windows Firewall profiles

19
Q

you can use __________________ to detect profile and enable rules based on profile….

A

Application Programming Interface (API)

20
Q

if you want to secure devices even more when on public network you can use ___________

A

Group Policy Object (GPO)

21
Q

• packet filtering framework on Linux kernel with;

	i. Stateless packet filtering 
	ii. Stateful packet filtering 
	iii. Network Address Translation (NAT) 
	iv. Port Address Translation (PAT)
22
Q

code that handles intercepted function calls events or messages passed between the software components

23
Q

standard firewall in Linux

configure view tables of packet filter rules

A

IPtables

+ nftables (modern varient)

24
Q

i. packet protocol type
ii. source address
iii. destination address
iv. source port
v. destination port
vi. network interface being used
vii. relation to previous packets

A

IPtable definable Rules

25
ACCEPT, DROP, RETURN
TARGET functions
26
IPtables and rules are organized into....
CHAINS
27
Packets are checked against chains how....
Sequentially
28
3 default chains....
INPUT, OUTPUT, FORWARD
29
RFC 1918
10. 0.0.0-10.255.255.255 172. 16.0.0-172.31.255.255 192. 168.0.0-192.168.255.255
30
modifies network address in IP Headers of packets
NAT
31
DHCP Request Process
Discover port:67 (client) Offer port:68 (server) Request (client) Acknowledge (server)
32
maintain distinct rule-set for each traffic flow (ingress and egress) security zones common practice for enterprise solutions
Firewall Inspection
33
Block ALL incoming traffic by default....
sudo iptables -p INPUT DROP
34
Open port 22 to be reached ONLY by 172.16.200.100
sudo iptables -I INPUT 2 TCP --dport 22 -s172.16.200.100 -j ACCEPT
35
Which command removes a config file for SSH?
sudo rm -f /etc/ssh/sshd_not_to_be_run
36
Which command will allow packets of existing outbound connections to be allowed back in WITHOUT being dropped?
sudo iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
37
IPtables uses a set of _____ which have _____ that contain set of built-in or user defined _____
tables - chains - rules