Module 6 - Network Security Infrastructure Flashcards
(117 cards)
Which system enforces an access control policy between internal and external networks by inspecting and filtering traffic?
A firewall
What characteristic of firewalls ensures that they can withstand and operate during network-based attacks?
Firewalls are resistant to network attacks
In a standard firewall setup, what happens to traffic that originates from the untrusted public network and targets the private network?
It is blocked by default
In a private/public firewall model, what type of traffic is generally allowed if it originates from the trusted inside network?
Outbound traffic and return traffic associated with it
Which component is the only transit point between an internal corporate network and external networks in a properly secured architecture?
A Firewall -{all traffic flows through it to enforce access control.}
Which firewall type is most commonly used today due to its versatility and ability to track active connections?
A stateful firewall
Which key role of firewalls ensures that traffic complies with defined security rules before entering or exiting a network?
Enforcing Access Control Policy
What performance-related drawback can firewalls introduce to a network?
Slow network performance due to traffic filtering and inspection
What tactic might attackers use to bypass firewalls by hiding unauthorized content inside seemingly safe data?
Tunnelling
Which two interfaces typically define a basic firewall architecture, separating trusted and untrusted zones?
Inside interfaces (Private network) and Outside interfaces (Public interfaces)
Which firewall design introduces a third interface used to host public-facing services separately from the private network?
A DMZ (Demilitarized zone) architecture
Which traffic direction is typically blocked entirely in a DMZ firewall design for security reasons?
Traffic from the public network to private network
Which firewall model allows grouping interfaces into logical units with similar policies for easier management?
A ZPF (Zone based Policy Firewall)
Which special zone in a ZPF includes all IP addresses of the router itself?
A self zone -{it covers traffic to and from the router.}
By default, how does a ZPF handle traffic directed to or from the self zone?
Traffic must be explicitly permitted
Which firewall uses simple policy table lookups to permit or deny traffic?
A Packet filtering (stateless) firewall.
Which firewall type filters traffic using only Layer 3 and Layer 4 information ?
A packet filtering (Stateless) firewall
Which type of firewall can be used to block a specific application port, such as SMTP on port 25, from a certain device?
A packet filtering (stateless firewall)
Which type of firewall maintains a state table to track active connections and makes decisions based on session context?
A stateful firewall
Which two OSI layers are examined by stateful firewalls in addition to maintaining connection context?
Layer 4 and Layer 5
Which type of firewall uses a proxy to relay client requests to external servers, effectively hiding the client’s identity?
An Application Gateway firewall (Proxy firewall)
Which OSI layers are filtered by an application gateway firewall?
Layers 3, 4, 5 and 7
Which firewall class adds intrusion prevention, application awareness, and future-proofing features beyond stateful filtering?
A NGFW (Next generation Firewall)
Which firewall type intercepts all traffic between a client and server and performs filtering in software?
An Application gateway firewall (Proxy firewall)