Chapter 7,8,9 Network security, Firewalls, and VPNs Second Edition

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is anomaly-based detection?

A form of intrusion detection system/intrusion prevention system (IDS/ IPS) based on a defined normal, often defined using rules similar to firewall rules.

Which of the following describes an access control list (ACL)?

A mechanism that defines traffic or an event to apply an authorization control of allow or deny against.

Which of the following describes fair queuing?

A technique of load balancing that operates by sending the next transaction to the firewall with the least current workload.

Which of the following describes a general purpose OS?

An operating system such as windows or linux that can support a wide variety of purposes and functions, but which, when used as a bastion host OS, must be hardened and locked down.

Which of the following refers to a system designed, built, and deployed specifically to serve as a frontline defense for a network?

Bastion host

Which of the following refers to a form of IDS/IPS detection based on a recording of real-world traffic as a baseline for normal?

Behavioral-based detection

Which of the following refers to a form of IDS/IPS detection based on a collection of samples, patterns, signatures, and so on stored in a database of known malicious traffic and events? All traffic or events that match an item in the database are considered abnormal and potentially malicious.

Database-based detection

It's important to evaluate the purpose and content of your firewall policy. Which of the following is not an evaluation method?

Determine how to write a policy that is as short as possible to avoid confusion.

Which term describes an approach to security similar to defense in depth in that it supports multiple layers, but uses a different security mechanism at each or most of the layers?

Diversity of defense

HTTP Proxy is Linux software powered by VMware that creates SSH encrypted tunnels used in combination with TOR.

False

If you do not eliminate personal communications, business functions can continue unhindered.

False

Intruders can edit data written to a WORM device.

False

Signature-based detection describes a form of intrusion detection system/intrusion prevention system (IDS/ IPS) based on a defined normal.

False

The Eradication phase of an incident response plan returns the situation to normal operation.

False

The term weakest link describes an organization's filtering configuration; it's the answer to the question, "What should be allowed and what should be blocked?"

False

You cannot replace a native or default software firewall product in a general-purpose operating system (OS) with a third-party option.

False

Which of the following refers to an event that does not trigger an alarm but should have, due to the traffic or event actually being abnormal and/or malicious?

False negative

Which of the following does not protect against fragmentation attacks?

Firewalking

Which of the following is not a security strategy?

Firewall policies

Which of the following uses a brute-force technique to craft packets and other forms of input directed toward the target?

Fuzzing tools

Which of the following are documents that can help you to review and assess your organization's status and state of security?

Incident response plan

Which one of the following is not a benefit of having a written firewall policy?

It defines how to use a revers proxy to add an additional layer of protection and control between Internet-based users and internally hosted servers.

Which of the following can improve firewall performance?

Load balancing

Which of the following uses ICMP as a tunneling protocol?

Loki

Which command-line or graphical interface is used to control and configure a device?

Management interface

Which of the following is a malicious remote control tool?

NetBus

Which of the following creates TCP and UDP network connections to or from any port?

Netcat

Which of the following is a network mapper, port scanner, and OS fingerprinting tool that checks the state of ports, identifies targets, and probes services?

Nmap

Which of the following refers to a network access control or admission control (NAC) used on individual network access devices, such as firewalls, VPN gateways, and wireless routers, to offload authentication to a dedicated authentication server/service?

PNAC

Which of the following steps of an incident response plan returns to the operation to normal?

Recovery

There are six steps for writing a security incident response plane. Which of the following is not a step?

Report

Which of the following is a centralized logging service that hosts a duplicate copy of log files?

Syslog

Which of the following is a technique for storing or copying log events to a centralized logging server?

Syslog

A firewall can perform only the operations for which it is programmed, and the specifics of and the order of the rules that result in less access rather than greater access are: List specific Deny rules first, then the Allow exceptions, and always keep the default-deny rule last.

True

A firewall's vulnerability to DoS flooding is a limitation or weakness that you can't fix, improve, or repair by either upgrading the firewall or applying a patch.

True

Each form of firewall filtering or traffic management is vulnerable in some way.

True

Encryption of the session that accesses a firewall's management interface is the most important and critical aspect of management interface configuration.

True

Fair queuing is a technique of load balancing that operates by sending the next transaction to the firewall with the least current workload.

True

Snort is an open-source, rule-based IDS that can detect firewall breaches.

True

The definition of a business task should consider whether or not the task is necessary. If the task is necessary, the organization's security solution should make the task possible.

True

When defining firewall rules, you should keep the rule set as simple as possible.

True

When it comes to firewall rules, in general, grant access only to traffic that is essential.

True

When security interferes with doing business and an organization believes that security can be turned off because it is inconvenient, it's only a matter of time before a catastrophic compromise occurs.

True

You should immediately terminate any communication found to take place without firewall filtering.

True

You should spend security funds somewhat evenly to secure the overall organization, rather than over-securing one area and neglecting another.

True

Which of the following refers to the deployment of a firewall as an all-encompassing primary gateway security solution?

UTM

Which of the following is not a commonsense element of troubleshooting firewalls?

Work with urgency

Which of the following describes security stance?

an organization's filtering configuration; it answers the question, "What should be allowed and what should be blocked?"

Which of the following does port forwarding support?

any service on any port

Which of the following is a dedicated hardware device that functions as a black-box sentry?

appliance firewall

Which of the following is not a protection against fragmentation attacks?

buffer overflows

Which of the following forces all traffic, communications, and activities through a single pathway or channel that can be used to control bandwidth consumption, filter content, provide authentication services, or enforce authorization.

chokepoint

Which of following is an advantage of the build-it-yourself firewall?

cost

Which term describes a security stance that prevents all communications except those enabled by specific allow exceptions?

deny by default/allow by exception

A false negative is an event that triggers an alarm when the traffic or event is abnormal and/or malicious.

false

Authentication and authorization must be used together.

false

Denial of service (DoS) attacks cannot be detected by a firewall.

false

Deploy firewalls as quickly as possible.

false

Deploying a security product is more preferable than addressing your environment's specific risks.

false

Port forwarding supports caching, encryption endpoint, and load balancing.

false

The firewall administrator should give physical access to firewall devices to senior managers and middle managers.

false

When troubleshooting firewalls, you should never attempt to repeat the problem because you could do more damage.

false

Which of the following is a written expression of an item of concern (protocol, port, service, application, user, IP address) and one or more actions to take when the item of concern appears in traffic?

filter

In which type of system environment do you block all access to all resources, internal and external, by default, and then use the principle of least privilege by adding explicit and specific allow-exceptions only when necessary based on job descriptions?

filter-free

Which type of test is run in non-production subnets where you've configured a duplicate of the production environment?

laboratory test

When troubleshooting firewalls, which of the following is not something you should do after you attempt a fix?

make multiple fixes

Which of the following troubleshooting steps involves reviewing the entire troubleshooting response process?

performing a post-mortem review

Which of the following steps of an incident response plan selects and trains security incident response team (SIRT) members and allocates resources?

preparation

Which of the following refers to an operating system built exclusively to run on a bastion host device?

proprietary os

Which of the following provides faster access to static content for external users accessing internal Web servers?

reverse caching

Which of the following hands out tasks in a repeating non-priority sequence?

round robin

Which of the following is not a common reason for deploying a reverse proxy?

time savings

Adding caching to a firewall transforms it into a proxy server for whatever service you configure the caching to supplement.

true

Allowing every communication is a bad idea from a security standpoint as well as a productivity one.

true

Diversity of defense uses a different security mechanism at each or most of the layers.

true

Firewalking is a hacking technique used against static packet filtering firewalls to discover the rules or filters controlling inbound traffic.

true

If strong authentication is a priority, select an application gateway firewall or a dedicated application-specific proxy firewall.

true

Netcat is a hacker tool that creates network communication links using UDP or TCP ports that support the transmission of standard input and output.

true

Overlapping occurs when full or partial overwriting of datagram components creates new datagrams out of parts of previous datagrams.

true

PacketiX VPN and HotSpotShield are encrypted Web proxy services.

true

Rule-set ordering is critical to the successful operation of firewall security.

true

Security through obscurity can be both a good strategy and a bad one depending on the type of security.

true

Simulator tests are secure by design.

true

The Containment phase of an incident response plan restrains further escalation of the incident.

true

The Detection phase of an incident response plan confirms breaches.

true

Unified threat management (UTM) has the advantage of managing multiple security services from a single interface.

true

When troubleshooting firewalls, you should simplify the task by first disabling or disconnecting software and hardware not essential to the function of the firewall.

true

Wireshark can be used in the absence of a firewall, with a firewall set to allow all traffic, or even in the presence of a firewall to inventory all traffic on the network.

true

Wireshark is a free packet capture, protocol analyzer, and sniffer that can analyze packets and frames as they enter or leave a firewall.

true

You should consider placing rules related to more common traffic earlier in the set rather than later.

true

You should not automatically purchase the product your cost/benefit analysis says is the best option.

true


Ensembles d'études connexes

Medical terminology Midterm Review

View Set

Modern Dental Assistant Chapter 61

View Set

SCM Chapter 7 Quiz (90% correct)

View Set

Chapter 19: Blood Vessels and Circulation

View Set

#5 - Hypertrophy, Atrophy & Hyperplasia (Pgs. 11-12)

View Set

Ch-1 (What is an Accident?) and Ch-2 (An Accident Happens: What Do You Do? How Long Do You Do It?)

View Set

PF 5- Overview of Loans, Mortgages, Other Loans, & Rent or Buy-11/27/17(Mon.)- Q2: Loans

View Set