Introduction to Firewalls & Basic ASA Configuration

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

next-generation

A _____ firewall is a hardware or software-based network security system that is able to detect and block sophisticated attacks by enforcing security policies at the application level, as well as at the port and protocol level.

firewall

A _____ is a system or group of systems that manages access between two or more networks, where one network is trusted and the others are less trusted.

forward proxy

A _____ is an Internet-facing proxy used to retrieve from a wide range of sources.

reverse proxy

A _____ is usually an Internet-facing proxy used as a front-end to control and protect access to a server on a private network. It also commonly performs tasks such as load-balancing, authentication, decryption or caching.

stateful, connection

A _____ packet filter firewall maintains state information in a state table, referred to as a _____ table.

application-level proxy

An _____ firewall is a security device that intercepts users' communications. It understands and interprets the commands of the application protocol it is providing proxy services for. It is particularly memory and CPU intensive.

higher, lower

By default, a Cisco ASA allows traffic to flow from a _____ security boundary to a _____ security boundary (including return traffic). Also, all ICMP packets going through the appliance are denied unless specifically permitted.

blank

The default Cisco ASA password is _____.

packet filter

With _____ firewalls, traffic is examined based solely on values found in the packet's header and are implemented by means of statically configured firewall rules.

*do*

You can execute any ASA command regardless of the current configuration mode, so the _____ command is unnecessary unlike in IOS.

q

You can interrupt the output of a *show* command by simply using the '_____' key.

Application proxies/application gateway

_____ firewalls are devices that operate as intermediary agents on behalf of clients that are on a private or protected network.

Context-aware

_____ firewalls provide granular control of applications, comprehensive user identification, and location-based control.

Cut-through Proxy (CTP)

_____ is used to authenticate Telnet, HTTP, and FTP connections.

Sequence Number Randomization (SNR)

_____ is used to secure TCP connections.


Set pelajaran terkait

Disorders Featuring Somatic Symptoms (Quiz #3a)

View Set

EDUCATION 108 - EB/MU - 2.23.18 - CHAPTER 6 - Head Start and Early Head Start: Empowering Change from Within

View Set

Chapter 1 Social Media Marketing

View Set

Surviving Mount Everest comprehension

View Set

POLITICAL SCIENCE 1602 FINAL EXAM PRACTICE

View Set

1.02 Quiz: Ideas and Imagination

View Set

B394: Drugs and Behavior - Exam 2

View Set

Iseeit! Video Case: Value Creation Through the Marketing Mix

View Set

RH134 V8.2 Ch4: File Access Control Lists (facls)

View Set