Lesson 10 - Chapter 4: Firewalls and Internet Appliances Flashcards

1
Q

What are firewalls?

A

devices or applications that protect an internal network from unauthorized access to/from the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 2 of some of the methods firewalls use to protect networks?

A
  1. hiding IP addresses
  2. blocking TCP/IP ports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A typical network uses one or both of which 2 types of firewalls?

A
  1. Hardware firewalls (built into routers)
  2. Software firewalls (run on your computers)

(both protect your computer and network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Can you run hardware and software firewalls at the same time?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most SOHO networks use what type of firewalls?

A

Hardware firewall (a feature built into a router)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a hardware firewall protect a LAN from outside threats?

A

Filters the packets before they reach your internal machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where do you go to configure a hardware firewalls?

A

your router’s browser-based settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do hardware firewalls use to inspect each incoming packet individually? What does it also block?

A

they use stateful packet inspection (SPI) which also blocks any incoming traffic that isn’t in response to your outgoing traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does SPI stand for? What uses it?

A

Stateful Packet Inspection (what hardware firewalls use to inspect incoming packets individually)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does “stateful” mean?

A

they check the state of communication of each inbound or outbound packet to confirm the 2 communicators are in an authentic conversation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you do if you want to allow outside users to access a web server on the LAN?

(remember, NAT hides the true IP addresses of your systems behind a single public IP address so you need to find a way to allow incoming traffic past the router/firewall and redirect it to the right PC)

A

You can use Port Forwarding to open a port in the firewall and direct incoming traffic on that port to a specific IP address on your LAN (the web server machine)

(for example, open Port 80 for HTTP packets to send all incoming traffic to the server machine)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Port Forwarding?

A

enables you to open a port in the firewall and direct all incoming traffic to that port (and to a specific IP address on your LAN)

(allows outside users access to a system/server on your LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s another way to open ports on a firewall? What does it do? (2)

A

Port Triggering

it enables you to open an incoming connection to one computer automatically based on a specific outgoing connection

The trigger port defines the outgoing connection, and the destination port defines the incoming connection. If you set the trigger port to 3434 and the destination port to 1234, for example, any outgoing traffic on port 3434 will trigger the router to open port 1234 and send any received data back to the system that sent the original outgoing traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s the difference between port forwarding and port triggering?

A

Port Forwarding = opens the port all the time, multiple devices can share the port and must use a static IP address

Port Triggering = only opens the incoming port when a single client at a time requests access to the trigger port and does not require static IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do you use if you want to open every port on a machine?

A

Demilitarized Zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a DMZ?

A

Demilitarized zone

it puts systems with the specified IP addresses outside the protection of the firewall (opening all ports and enabling all incoming traffic)

Completely dangerous, don’t use it!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the software firewall built into Windows?

A

Windows Defender Firewall

(handles port blocking, security logging, etc)

18
Q

Should you use the same firewall settings for both public and private networks?

A

no

(using public networks should have more strict firewall settings)

19
Q

Setting the appropriate firewall settings (public vs private) affects what 2 things?

A
  1. Windows Defender Firewall
  2. The PC’s ability to share and discover resources
20
Q

What is a private network (the option)?

A

enables you to share resources, discover devices, and allow devices to discover your computer safely

21
Q

What is a public network?

A

prevents your computer from sharing and disables all discovery protocols

22
Q

Making a network private or public is an issue for both Wi-Fi and wired Ethernet connections. T or F?

A

False, wired connections are assumed to be private

23
Q

When does Windows prompt you to choose the network type?

A

when your computer connects to a Wi-Fi network for the first time

24
Q

You can change a network’s public/private designation any time as long as what?

A

you are connected to it

25
Q

where do you go to change the public/private designation?

A

settings > network & internet > Wi-Fi > Network’s SSID > Network Profile type, click public or private

(or just right-click the WiFi icon in the notification area)

26
Q

How do you access Windows Defender Firewall? (2 ways)

A
  1. Start menu (type it(
  2. Control Panel > System and Security > Windows Defender Firewall
27
Q

What are exceptions?

A

choosing which programs and services can pass through the firewall

28
Q

How are programs added to the firewall exceptions list?

A

most add themselves automatically when you install them

(otherwise, Windows prompts you the first time you run it)

29
Q

What is the Windows Defender Firewall with Advanced Security? Where do you find it?

A

You find it under the Advanced Settings option for Windows Defender Firewall

It’s a tool (MMC snap-in) that gives you more control over exceptions

30
Q

What are Internet appliances?

A

special-purpose devices that are incorporated into networks (typically provides levels of network security or performance boosting)

31
Q

What are spam gateways?

on A+ exam

A

anti-spam appliances, devices that use onboard software to filter out incoming spam e-mails and IMs (spim)

32
Q

Where are spam gateways typically used?

A

primarily in enterprise organizations, but many ISPs, schools, and small businesses have a version of this function

33
Q

What does UTM stand for?
on A+ exam

A

UTM = unified threat management

34
Q

What is UTM?

on A+ exam

A

Combines hardware and software to perform many security functions (firewall, remote access, VPN, web traffic filtering, anti-malware, etc)

35
Q

What does a UTM look like? Which 2 places is it placed?

A

a Unified Threat Management solution can be a special appliance that is placed between an internal network and an end/gateway device or even installed on a virtual machine running cloud services

36
Q

What are load balancers?

on A+ exam

A

spreads out the processing required to respond to incoming traffic requests across a group of servers so it’s as even as possible

(incoming requests are assigned to the next available, capable server)

37
Q

Where are load balancers found?

A

they sit on the network between client devices and the servers to be balanced

38
Q

What are proxy servers?

on A+ exam

A

an intermediary between its users and the resources they request

39
Q

How do proxy servers work?

A

applications send requests to the proxy server instead of trying to access the Internet directly and the proxy server fetches the resources for the user instead

40
Q

What Internet appliance allows you to monitor usage and restrict/modify access to content?

A

proxy servers

41
Q

Where are proxy servers found?

A

Enterprise proxy servers are usually implemented as software running on a multi-purpose server