Firewalls, Encryption, Hashing Algorithms
What type of firewall topology consists of placing a screening router between a dual-homed host and the public network?
Screened-host
What type of firewall topology consist two screening routers, one placed between the dual-homed firewall and the internet and the other between the dual-homed firewall and the internal network?
Screened-subnet
Created by the National Security Agency, this commonly used version of the hashing algorithm generates a 160-bit hash value.
Secure Hash Algorithm 1 SHA-1
A block cipher supporting 128-bit, 192-bit, and 256-bit encryption that has replaced 3DES as the new standard.
Advanced Encryption Standard
What is a web application firewall's main focus?
Analyzing HTTP traffic
What type of firewall can filter traffic based on the payload data in the packet?
Application
A block cipher algorithm created to replace DES, offering variable encryption rates from 1 to 448-bit encryption.
Blowfish
A 56-bit block cipher selected by the Government as a standard in the 1970's.
Data Encryption Standard DES
Key exchange protocol.
Diffie Hellman
What type of firewall topology consists of a single computer with two physical network interfaces that act as a gateway between the two networks?
Dual-homed host
Newer asymmetric algorithm that is based on Diffie Hellman for key exchange and Digital Signature Algorithm for signing messages.
Elliptic Curve
Uses a secret key combined with the hashing algorithm to calculate the resulting hashing value.
Hash-based Message Authentication Code HMAC
This hashing algorithm used by older Microsoft operating systems to hash and store passwords is considered unsecure.
LANMAN
Created by Ron Rivest, this hashing algorithm is one of the most commonly used today and generates a 128-bit hash value.
Message Digest 5 MD5
Uses MD4 for hashing and storing passwords in the registry. Version 2 uses HMAC-MD5.
NT LAN Manager NTLM
What type of firewall is known as a stateless inspection firewall because it simply allows or denies traffic based on the header of the packet?
Packet-Filtering
What type of firewall uses rules to filter traffic based on source address, destination address, protocol, and source and destination and port address?
Packet-filtering
Uses 128-bit, 160-bit, 256-bit, and 320-bit hashing levels.
RACE Integrity Primitive Evaluation Message Digest RIPEMD
There are different versions of this cipher. One is a stream cipher that is used in SSL and WEP.
Rivest Cipher RC4/RC5
First asymmetric algorithm to implement signing and encryption.
Rivest Shamir Adleman RSA
Two newer versions of the SHA algorithm that are not considered to be susceptible to collision attacks.
SHA-256 SHA-512
What type of firewall can filter traffic based on source and destination IP address or port number, but can also look at the context of the conversation and determine if the packet is supposed to be received at that point?
Stateful Packet Inspection
A block cipher that runs information through three 56-bit keys to create 168-bit encryption.
Triple DES 3DES
Bruce Schneier's second encryption algorithm that offers 129-bit encryption
Twofish
What security device allows you to control which HTTP messages can reach a web server?
Web application firewall
A device or software that protects your network from malicious content on the Internet and can provide data loss prevention.
Web security gateway