Deck 9: Firewalls and Intrusion Prevention Systems

Full screen (f)
exit full mode
Question
An important aspect of a distributed firewall configuration is security
monitoring.
Use Space or
up arrow
down arrow
to flip the card.
Question
The firewall may be a single computer system or a set of two or more
systems that cooperate to perform the firewall function.
Question
The countermeasure to tiny fragment attacks is to discard packets with
an inside source address if the packet arrives on an external interface.
Question
One disadvantage of a packet filtering firewall is its simplicity.
Question
The primary role of the personal firewall is to deny unauthorized
remote access to the computer.
Question
The firewall can protect against attacks that bypass the firewall.
Question
_________ control determines the types of Internet services that can be accessed,inbound or outbound.

A)Behavior
B)Direction
C)Service
D)User
Question
Unlike a firewall,an IPS does not block traffic.
Question
A packet filtering firewall is typically configured to filter packets going
in both directions.
Question
A firewall can serve as the platform for IPSec.
Question
_________ control determines the direction in which particular service requests may be initiated and allowed to flow through the firewall.

A)Behavior
B)User
C)Direction
D)Service
Question
Distributed firewalls protect against internal attacks and provide
protection tailored to specific machines and applications.
Question
A logical means of implementing an IPSec is in a firewall.
Question
_________ control controls how particular services are used.

A)Service
B)Behavior
C)User
D)Direction
Question
A traditional packet filter makes filtering decisions on an individual
packet basis and does not take into consideration any higher layer context.
Question
The _________ defines the transport protocol.

A)destination IP address
B)source IP address
C)interface
D)IP protocol field
Question
A DMZ is one of the internal firewalls protecting the bulk of the
enterprise network.
Question
A prime disadvantage of an application-level gateway is the additional
processing overhead on each connection.
Question
________ control controls access to a service according to which user is attempting to access it.

A)User
B)Direction
C)Service
D)Behavior
Question
Snort Inline enables Snort to function as an intrusion prevention
capability.
Question
The ________ IP address is the IP address of the system that originated the IP packet.
Question
The __________ protocol is an example of a circuit-level gateway implementation that is conceptually a "shim-layer" between the application layer and the transport layer and does not provide network-layer gateway services.
Question
__________ scans for attack signatures in the context of a traffic stream rather than individual packets.

A)Pattern matching
B)Protocol anomaly
C)Traffic anomaly
D)Stateful matching
Question
A _________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.
Question
A __________ firewall controls the traffic between a personal computer or workstation on one side and the Internet or enterprise network on the other side.
Question
The _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter to protect the premises network from Internet-based attacks.
Question
An example of a circuit-level gateway implementation is the __________ package.

A)application-level
B)SOCKS
C)SMTP
D)stateful inspection
Question
An intruder transmitting packets from the outside with a source IP address field containing an address of an internal host is known as IP address _________.
Question
A ________ uses encryption and authentication in the lower protocol layers to provide a secure connection through an otherwise insecure network,typically the Internet.
Question
__________ looks for deviation from standards set forth in RFCs.

A)Statistical anomaly
B)Protocol anomaly
C)Pattern matching
D)Traffic anomaly
Question
A __________ gateway sets up two TCP connections,one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host.

A)packet filtering
B)stateful inspection
C)application-level
D)circuit-level
Question
The _________ attack is designed to circumvent filtering rules that depend on TCP header information.

A)tiny fragment
B)address spoofing
C)source routing
D)bastion host
Question
Typical for SOHO applications,a __________ is a single router between internal and external networks with stateless or full packet filtering.

A)single bastion T
B)double bastion inline
C)screening router
D)host-resident firewall
Question
A ___________ makes use of both signature and anomaly detection techniques to identify attacks.
Question
__________ protocols operate in networking devices,such as a router or firewall,and will encrypt and compress all traffic going into the WAN and decrypt and uncompress traffic coming from the WAN.
Question
A _________ consists of a set of computers that interconnect by means of a relatively unsecure network and makes use of encryption and special protocols to provide security.

A)proxy
B)UTM
C)VPN
D)stateful inspection firewall
Question
Identified as a critical strong point in the network's security,the _________ serves as a platform for an application-level or circuit-level gateway.
Question
A _________ configuration involves stand-alone firewall devices plus host-based firewalls working together under a central administrative control.

A)packet filtering firewall
B)distributed firewall
C)personal firewall
D)stateful inspection firewall
Question
Typically the systems in the _________ require or foster external connectivity such as a corporate Web site,an e-mail server,or a DNS server.

A)DMZ
B)IP protocol field
C)boundary firewall
D)VPN
Question
__________ are attacks that attempt to give ordinary users root access.

A)Privilege-escalation exploits
B)Directory transversals
C)File system access
D)Modification of system resources
Question
__________ anomaly watches for unusual traffic activities,such as a flood of UDP packets or a new service appearing on the network.
Question
A single device that integrates a variety of approaches to dealing with network-based attacks is referred to as a __________ system.
Question
The firewall follows the classic military doctrine of _________ because it provides an additional layer of defense.
Question
Snort Inline adds three new rule types: drop,reject,and _________.
Question
_________ matching scans incoming packets for specific byte sequences (the signature)stored in a database of known attacks.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Firewalls and Intrusion Prevention Systems
1
An important aspect of a distributed firewall configuration is security
monitoring.
True
2
The firewall may be a single computer system or a set of two or more
systems that cooperate to perform the firewall function.
True
3
The countermeasure to tiny fragment attacks is to discard packets with
an inside source address if the packet arrives on an external interface.
False
4
One disadvantage of a packet filtering firewall is its simplicity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
The primary role of the personal firewall is to deny unauthorized
remote access to the computer.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
The firewall can protect against attacks that bypass the firewall.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
_________ control determines the types of Internet services that can be accessed,inbound or outbound.

A)Behavior
B)Direction
C)Service
D)User
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Unlike a firewall,an IPS does not block traffic.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
A packet filtering firewall is typically configured to filter packets going
in both directions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
A firewall can serve as the platform for IPSec.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
_________ control determines the direction in which particular service requests may be initiated and allowed to flow through the firewall.

A)Behavior
B)User
C)Direction
D)Service
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Distributed firewalls protect against internal attacks and provide
protection tailored to specific machines and applications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
A logical means of implementing an IPSec is in a firewall.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
_________ control controls how particular services are used.

A)Service
B)Behavior
C)User
D)Direction
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
A traditional packet filter makes filtering decisions on an individual
packet basis and does not take into consideration any higher layer context.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The _________ defines the transport protocol.

A)destination IP address
B)source IP address
C)interface
D)IP protocol field
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
A DMZ is one of the internal firewalls protecting the bulk of the
enterprise network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
A prime disadvantage of an application-level gateway is the additional
processing overhead on each connection.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
________ control controls access to a service according to which user is attempting to access it.

A)User
B)Direction
C)Service
D)Behavior
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Snort Inline enables Snort to function as an intrusion prevention
capability.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
The ________ IP address is the IP address of the system that originated the IP packet.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
The __________ protocol is an example of a circuit-level gateway implementation that is conceptually a "shim-layer" between the application layer and the transport layer and does not provide network-layer gateway services.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
__________ scans for attack signatures in the context of a traffic stream rather than individual packets.

A)Pattern matching
B)Protocol anomaly
C)Traffic anomaly
D)Stateful matching
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
A _________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
A __________ firewall controls the traffic between a personal computer or workstation on one side and the Internet or enterprise network on the other side.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
The _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter to protect the premises network from Internet-based attacks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
An example of a circuit-level gateway implementation is the __________ package.

A)application-level
B)SOCKS
C)SMTP
D)stateful inspection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
An intruder transmitting packets from the outside with a source IP address field containing an address of an internal host is known as IP address _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
A ________ uses encryption and authentication in the lower protocol layers to provide a secure connection through an otherwise insecure network,typically the Internet.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
__________ looks for deviation from standards set forth in RFCs.

A)Statistical anomaly
B)Protocol anomaly
C)Pattern matching
D)Traffic anomaly
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
A __________ gateway sets up two TCP connections,one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host.

A)packet filtering
B)stateful inspection
C)application-level
D)circuit-level
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The _________ attack is designed to circumvent filtering rules that depend on TCP header information.

A)tiny fragment
B)address spoofing
C)source routing
D)bastion host
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
Typical for SOHO applications,a __________ is a single router between internal and external networks with stateless or full packet filtering.

A)single bastion T
B)double bastion inline
C)screening router
D)host-resident firewall
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
A ___________ makes use of both signature and anomaly detection techniques to identify attacks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
__________ protocols operate in networking devices,such as a router or firewall,and will encrypt and compress all traffic going into the WAN and decrypt and uncompress traffic coming from the WAN.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
A _________ consists of a set of computers that interconnect by means of a relatively unsecure network and makes use of encryption and special protocols to provide security.

A)proxy
B)UTM
C)VPN
D)stateful inspection firewall
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
Identified as a critical strong point in the network's security,the _________ serves as a platform for an application-level or circuit-level gateway.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
A _________ configuration involves stand-alone firewall devices plus host-based firewalls working together under a central administrative control.

A)packet filtering firewall
B)distributed firewall
C)personal firewall
D)stateful inspection firewall
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
Typically the systems in the _________ require or foster external connectivity such as a corporate Web site,an e-mail server,or a DNS server.

A)DMZ
B)IP protocol field
C)boundary firewall
D)VPN
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
__________ are attacks that attempt to give ordinary users root access.

A)Privilege-escalation exploits
B)Directory transversals
C)File system access
D)Modification of system resources
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
__________ anomaly watches for unusual traffic activities,such as a flood of UDP packets or a new service appearing on the network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A single device that integrates a variety of approaches to dealing with network-based attacks is referred to as a __________ system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The firewall follows the classic military doctrine of _________ because it provides an additional layer of defense.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Snort Inline adds three new rule types: drop,reject,and _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
_________ matching scans incoming packets for specific byte sequences (the signature)stored in a database of known attacks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.